Intelligentedu
Best New Free Computer IT Training Tutorial Resources


January 5, 2011

Internet and Networking Tutorial Seminars

Here are some excellent Internet and Networking Tutorial Seminars, hosted by the University of Nebraska. These were originally broadcast as part of the EXCITE series (EXtending your Communications and Information Technology Experience). For each networking/Internet seminar you can play the online video and also download the original handout in pdf format. You will need the free RealPlayer to view the video.

Each seminar includes a list of resources, put together by the presenter, that provides a mix of materials from college courses to company pages. Resources vary from lecture notes to index resource pages to HTML versions of PowerPoint slide shows. (The links were current at time of seminar.)


Seminars




Introduction to Networking: how networks work - topologies, protocols, bandwidth, equipment (routers, gateway, bridge, etc.), Internet 1 & 2, and more.
Presenter: Cliff Ritz | View seminar (52:58 minutes) | Seminar Handout (PDF - 1 page, 27KB).

Resources





How TCP/IP Networks Work: TCP/IP, Protocols, Addressing, Routing, ISPs/Network Providers.
Presenter: Ron Roeber | View seminar (58:34 minutes) | Seminar Handout (PDF - 2 pages, 36KB)

Resources
  • TCP/IP Network Administration, 3rd Edition, April 2002. By Craig Hunt. Available from O'Reilly Online Catalog.
  • Computer Networks and Internets: Introduction
    This "Introduction" Web page provides information on how to use the website. The website is a collection of the support materials for the Computer Networks and Internets book (third edition). The book, written by Dr. Douglas Comer, gives an introduction to networking and internetworking. Professor Comer uses Computer Networks and Internets in his course CS 422, Computer Networks, at Purdue University.



Connectivity / Media Options: IP Service/ bandwidth services, Terrestrial/ Wireless, Backbone, DSL, Cable, Wireless options.
Presenter: Dan Cotton | View seminar (56:55 minutes) | Seminar Handout (PDF - 2 pages, 16KB)

Resources



Home and Small Office Computing Solutions: LANs and Networking options / issues.
Presenter: Terry Bockstadter | View seminar (45:57 minutes) | Seminar Handout (PDF - 2 pages, 48KB)

Resources
  • Network Magazine - provides news, Buyer's Guide, product reviews, tutorials, Case Studies, and more
  • ExtremeTech - provides technology news, opinion articles, tips, and more
  • PC Magazine - provides hardware and networking reviews, news and analysis, how-to information under the "Solutions" category, and more
  • Network Tutorial by Robert Brian Brown, D & M Electronics Inc.



Security, Part 1: Services, Ports, Opportunities for Exploitation, and Protection (Firewall, Viruses, Worms).
Presenters: Mark Hendricks & Ron Roeber | View seminar (51:10 minutes) | Seminar Handout (PDF - 2 pages, 36KB)

Resources
  • Internet Storm Center - information on what's happening on the net: status of attacks and links to Institute for Security Technology Studies (ISTS) news
  • CERT® Coordination Center - Internet security expertise clearinghouse located at the Software Engineering Institute, a federally funded research and development center operated by Carnegie Mellon University
  • antivirus.unl.edu - virus protection information and software updates for UNL staff
  • Security advisories from Symantec - Symantec is a leading Internet security technology company.



Security, Part 2: Commerce, Encryption, Transmission of data, Password, SSH, and Authentication and authorization.
Presenters: Mark Hendricks & Ron Roeber | View seminar (52:26 minutes) | Seminar Handout (PDF - 2 pages, 39KB)

Resources
  • OpenSSH
    FREE version of the SSH protocol suite of network connectivity tools. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other network-level attacks and it provides a variety of authentication methods
  • SSH
    SSH Communications Security is a supplier of Internet security software for demanding network security solutions. SSH provides cryptography and authentication technologies and products for secure Internet communications.
  • F-Secure SSH
    F-Secure Corporation is a provider of centrally managed security solutions for the mobile enterprise. The company's products include anti-virus, file encryption and network security solutions for all major platforms from desktops to servers and from laptops to handhelds.
  • PuTTY
    PuTTY is a free implementation of Telnet and SSH for Win32 platforms, along with an xterm terminal emulator.
  • NiftyTelnet
    NiftyTelnet 1.1 SSH r3 is an enhanced version of Chris Newman's NiftyTelnet 1.1 application which adds support for encrypted terminal sessions using the SSH (Secure Shell) protocol.
  • OpenSSL Project
    The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library. The project is managed by a worldwide community of volunteers.
  • VeriSign
    VeriSign's Site Trust Services offer e-commerce businesses tools to secure and e-commerce-enable websites to that customers can be certain the website is genuine, and that the information they send via Web browsers, and other devices stays private and confidential.
  • Covalent
    Covalent is one of the industry's leading providers of enterprise solutions for the Apache Web server. The Apache Web server software's market share exceeds 60 percent for all Web servers--more than Microsoft and Netscape combined.



Tags for this post>> | |

Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 7:13 pm


September 13, 2010

12 eBooks on LAMP, Networking, and Network Security

Here are 12 downloadable ebooks covering Linux, Apache, MySQL, and PHP (LAMP), along with 11 ebooks on networking and network security areas, as listed below. These technical ebooks are in pdf and chm formats.


12 eBooks covering LAMP:

 - Apache
 - Apache Security
 - PHP
 - MySQL and PHP
 - Linux System Admin


11 eBooks covering these Networking and Security topics:

 - Zope
 - Cisco CCSP
 - Wireless Newtworking
 - SSL - VPN
 - SSL Certificates
 - SSL - TLS
 - HTML
 - Zenoss



Tags for this post>> | | | | |


Filed under: Free Computer and I.T. Books — computer_teacher @ 11:44 am


July 22, 2010

27 Unix and Linux eBooks

Here are 27 downloadable Unix and Linux eBooks, covering the areas and topics listed below, including the LPI and RHCE cert exams.


Unix and Linux ebook topics
:

 - Linux ebooks
 - Linux Networking
 - Linux Administration
 - LPI Linux Certification exam ebooks
 - Red Hat RHCE Certification ebooks
 - Storage Virtualization
 - Unix
 - Unix Scripting
 - HP-UX
 - Solaris
 - Network and Computer Security



Tags for this post>> | | | | |


Filed under: Free Computer and I.T. Books — computer_teacher @ 11:22 am


April 13, 2010

Several Hundred Computer and Programming eBooks

Here is a ebook download repository site containing several hundred IT, computer and programming ebooks in the topics listed and sub-directories linked below. Most of these are in either pdf or chm formats.


Programming eBooks
 - C and C++ programming
 - Java programming
 - Python programming
 - Perl 
 - Shell Scripting
 - Assembly language

Unsorted Computer eBooks
   Linux programming, C++ programming,
   Java, Oracle, Unix, CISSP, Firewalls,
   Encryption, Perl, Java, JDBC, LPI Linux,
   SQL Server, MySQL, Networking

Linux eBooks
   Linux programming, Securing Linux,
   Linux Networking, Linux Tools,
   Linux Kernel, Linux Commands
   Linux Device Drivers. Linux Certification



SQL and Database eBooks
   SQL, SQL Server, Linux, MySQL,
   Oracle database, PostgreSQL,
   Berkeley DB

Security eBooks
   Security+ Certification, VPN, Snort
   Network Security, Firewalls, Wireless
   Security, XML Security

Networking eBooks

Coding and Software Methodology eBooks

Miscellaneous eBooks
   Algebra, Trigonometry, Biology, Calculus
   Chemistry, Economics, Electronics,
   Forensic Science, Geology, Physics,
   Algorithms



Tags for this post>> | | | | | | | | | | | |


Filed under: Free Computer and I.T. Books — computer_teacher @ 8:14 pm


March 19, 2010

102 Computer and Programming eBooks

Here are 102 computer and programming ebooks covering several areas, as linked and listed below, including C++ programming, Networking progamming, Ajax, Python, and computer security. Most of these freely available ebooks are in pdf and chm format.


C and C++ ebooks
 - 12 C++ programming ebooks
 - 4 C programming ebooks
 - 9 Network programming ebooks

Ajax ebooks
 - 4 Ajax programming ebooks

Python ebooks
 - 44 Python programming ebooks

Ruby ebooks
 - 3 Ruby programming ebooks

Jython
 - 4 Jython ebooks

Security ebooks
 - 19 computer security ebooks
 - Network security ebooks
 - Linux security ebooks
 - Windows security ebooks
 - Programming security
 - Database security

Database ebooks
 - PostgreSQL
 - Berkeley Database
 - SQLite



Tags for this post>> | | | | | | |


Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 4:26 pm


May 4, 2009

Security+ Essentials Online Book

Here is an excellent online book at techotopia, Security+ Essentials Online Book, that provides essential computer and networking security information. This computer security book gives you the knowledge needed to pass the CompTIA Security+ certification exam. It provides a clear understanding of both the threats faced by I.T. and with implementing a comprehensive security infrastructure. The 15 sections cover a variety of computer security topics and will assist anyone who needs to understand these when deploying and administering a secure I.T. environment.


Table of Contents  of Security+ Essentials:

About Security+ Essentials

Mandatory, Discretionary, Role and Rule Based Access Control
 - An Overview of Access Control
 - Mandatory Access Control
 - Discretionary Access Control
 - Role Based Access Control
 - Rule Based Access Control

Authentication and Identity Verification
 - What is Authentication?
 - Username and Password
 - Challenge Handshake Authentication Protocol (CHAP)
 - Kerberos Authentication
 - Mutual Authentication
 - Certificates
 - Authentication using Tokens
 - Biometrics

An Overview of IT Security Threats and Attacks
 - TCP and UDP Based Denial of Service (DoS) Attacks
 - Distributed Denial of Service (DDoS) Attacks
 - Back Door Attacks
 - IP and DNS Spoofing Attacks
 - Man in the Middle Attacks
 - Replay Attacks
 - TCP/IP Hijacking
 - Mathematical Attacks
 - Password Guessing
 - Brute Force Password Attacks
 - Dictionary Password Attacks
 - Password Cracking

Software Exploitation, Malicious Code and Social Engineering
 - Software Exploitation
 - Malicious Code
 - Viruses
 - Trojan Horses
 - Logic Bombs
 - Worms
 - Social Engineering

Identifying Common and Nonessential TCP/IP Ports and Services
 - Understanding Ports and Services
 - Securing Ports and Services
 - Port Scanning
 - Primary TCP/IP Ports and Assignments

Understanding Communications Security
 - Remote Access
 - Virtual Private Network (VPN) Communications
 - Point-to-Point-Tunneling Protocol (PPTP)
 - Layer 2 Tunneling Protocol (L2TP)
 - Internet Protocol Security (IPSec)
 - 802.11x Wireless Connections
 - Dial-Up Access
 - Terminal Access Controller Access Control System (TACACS)
 - Remote Authentication Dial-In User Service (RADIUS)
 - Terminal Access Controller Access Control System Plus(TACACS+)
 - Secure Shell (SSH)

The Basics of Email and Web Security
 - Email Security
 - Pretty Good Privacy (PGP)
 - Secure Multipurpose Internet Mail Extension (S/MIME)
 - Dealing with Spam Email
 - Web Based Security (SSL and TLS)

IT Infrastructure Security
 - Understanding Firewalls
 - Packet-Filtering Firewalls
 - Proxy Service Firewalls
 - Stateful Inspection Firewalls
 - Routers
 - Switches
 - Wireless
 - DSL and Cable Modems
 - Remote Access Service (RAS)
 - Telecom/PBX
 - Virtual Private Networks (VPN)
 - Intrusion Detection Systems (IDSs)
 - Network Monitoring and Diagnostics
 - Simple Network Management Protocol (SNMP)

IT Media Security Basics
 - Cable Media
 - Coax Cable
 - Shielded and Unshielded Twisted Pair Cable (UTP/STP)
 - Fiber Optic Cable
 - Removable Storage Media
 - Hard Drives
 - Diskettes
 - Tape Storage
 - CD-R/DVD
 - Electronic Media

Network Security Topologies
 - DMZ
 - Internet
 - Intranet
 - Extranet
 - Virtual Local Area Network (VLAN)
 - Network Address Translation (NAT)
 - Tunneling

Intrusion Detection Systems
 - An Overview of Intrusion Detection Systems
 - IDS Architecture
 - Host-based Intrusion Detections Systems (HIDS)
 - Strengths of Host-based Intrusion Detection Systems
 - Weaknesses of Host-based Intrusion Detection Systems
 - Network-based Intrusion Detection Systems (NIDS)
 - Strengths of Network-based Intrusion Detection Systems
 - Weaknesses of Network-based Intrusion Detection Systems
 - Responding to Incidents

Security Baselines and Operating System, Network and Application Hardening
 - Security Baselines
 - Operating System Hardening
 - Network Hardening
 - Application Hardening
 - Web Servers
 - Email Servers
 - FTP Servers
 - DNS Servers

Cryptography Basics
 - What is Cryptography?
 - Algorithms
 - Hashing Algorithms
 - Symmetric Encryption Algorithms
 - Data Encryption Standard (DES)
 - Triple DES (3DES)
 - Advanced Encryption Standard (AES)
 - Blowfish
 - International Data Encryption Algorithm (IDEA)
 - CAST
 - Rivest Cipher (RC2, RC3, RC4, RC5, RC6)
 - Asymmetric Algorithms
 - RSA
 - Diffie-Hellman
 - ElGamal
 - Elliptic Curve Cryptography (ECC)
 - Cryptography Usage
 - Confidentiality
 - Integrity
 - Nonrepudiation
 - Authentication
 - Digital Signatures

An Overview of Public Key Infrastructures (PKI)
 - What is a Public Key Infrastructure?
 - Certificate Authorities (CA)
 - Registration Authorities (RA)
 - Certificate Repositories
 - Digital Certificate Structure
 - Certificate Lifecycles and Key Management
 - Centralized and Decentralized Infrastructures



Tags for this post>> |




February 16, 2009

Computing and Networking Classes and Tutorials

Here are HP's Free Computing and Networking Classes and Lessons. These will teach you Networking basics, Server technology, backup strategies,, security, troubleshooting, and wireless networking. These courses and tutorials are available 24/7 and you can enroll in them or take them at any time.


Networking 101 Class
Learn all the basics of networking so you can set up, secure and maintain your own network.

Servers 101 Class
Learn to select, install, configure, secure, support and upgrade a small business server network.

Six steps to computer security (quick lesson)
In this quick lesson, you'll learn how to protect your notebook and desktop computers from hackers, crackers, viruses, spam and other threats.

Laptop PCs: Basic Troubleshooting and Repair (quick lesson)
Learn how to fix or avoid the "gotchas" that are unique or common to laptop computers.

Laptop PCs: Troubleshooting Wireless Problems (quick lesson)
An important part of laptop PC troubleshooting involves wireless connections and security issues.

Simple backup strategies with HP Backup and Recovery Manager (quick lesson with podcast)
Learn how to back up and restore vital business data, applications and entire systems using HP Backup and Recovery Manager software.

HP Backup and Recovery Manager: Restore Files  (8:13)
Learn how to use HP Backup and Recovery Manager to restore files in this demonstration.

HP Backup and Recovery Manager: Schedule Backups  (13:34)
All HP business desktop and notebook computers have HP Backup and Recovery Manager. This demonstration shows you how to use this application to back up files.

IT infrastructure and its challenges: outsource or hire? (quick lesson)
As a business grows, its IT support needs become challenging. Learn how to decide if it makes sense to hire or contract for IT help.



Tags for this post>> | |


Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 11:18 pm


February 10, 2009

16 Free Classes for IT Professionals from HP

Here are HP's 16 Free Classes for IT Professionals, covering topics such as data protection, security, storage networks, Windows Server 2008, virtualization, firewalls, backup and recovery, IT infrastructure, and wireless networking.
Learning center - free online classes


Servers and Storage Solutions

Disaster preparedness through virtualization (quick lesson)
Learn what virtualization is, how it works and the practical application of including virtualization in your disaster recovery plan.

ERP: resource planning solutions
Enterprise resource planning (ERP) is a major undertaking for any business. Learn how ERP can streamline your business.

How to build a midsize IT core infrastructure  
Understand how IT managers at midsize companies can build and deploy a core IT infrastructure simply and effectively.

Introduction to storage networks
Improve your storage area network by assessing your current infrastructure, addressing evolving needs and getting the best return on storage network investments.

Protect your data: back up to tape, disk and the network
Learn the importance of backup to small and mid-sized businesses and how to design the right data protection solution for your organization.

Understanding Microsoft Windows Server 2008
This course is designed to give IT professionals an overview of the features offered in Microsoft Windows Server 2008.

Virtualize your infrastructure: deployment
Find out how to use virtualization to help you save money, expand your network resources and maximize your IT budget.


PC Solutions

Combating spam and spyware (with podcast)
This class will give you a thorough understanding of what spam and spyware is, how it works, and how to manage it.

Evaluating desktop virtualization solutions
This class provides a background in desktop virtualization to help you make decisions about implementing a desktop virtualization plan.

Exploring and implementing Gobi and 3G technology
Learn about the speed and flexibility of new Gobi chip technology and how to use it as a company-wide mobile and wireless networking tool.

Firewall basics (with podcast)
Learn what a firewall is, explore firewall hardware and software and get a TCP/IP tutorial for help in setting up your firewall.

HP Backup and Recovery Manager: schedule backups  (13:34)
All HP business desktop and notebook computers have HP Backup and Recovery Manager. This demonstration shows you how to use this application to back up files.

HP ProtectTools: security at your fingertips (quick lesson with podcast)
Learn how to enable the computer systems security components of HP ProtectTools, found pre-installed on most HP PCs.

Simple backup strategies with HP Backup and Recovery Manager (quick lesson with podcast)
Learn how to back up and restore vital business data, applications and entire systems using HP Backup and Recovery Manager software.

Simplify your IT infrastructure: reduce total cost of ownership
This blade tutorial teaches you how easy it is to deploy server and storage blades to streamline management, save space and reduce costs.

Wireless networking with Bluetooth (quick lesson)
This brief will explain what Bluetooth is and how to use it, as well as give a detailed comparison of Bluetooth with other wireless technologies.



Tags for this post>> | | |


Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 12:39 am


September 2, 2008

Books and Training for Internetworking and Network Security

Dr. Rahul Banerjee of the Birla Institute of Technology and Science is providing the following Books, Training Content, and Slide Presentations for learning Internetworking, Network Security, and Computer Networks. This material and content is excellent and provides in-depth coverage of these important networking topics. If you need to learn about computer networks and internetworking basics and programming, then I highly recommend these free training and learning documents.


Internetworking Technologies


Network Security

Computer Networks



Tags for this post>> |

Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 11:11 pm


August 9, 2008

eBooks for .NET, Networking, and Database Design

Here are several Computing eBooks in pdf format from elib.hbi.ir. These ebooks cover .NET, ASP.NET, VB.NET, C#, XML, PHP and MySQL, Networking, Network Security, Database Design, JDBC, Linux Shell Scripting, and Windows 2003 Deployment. I have listed the topics below for the more recent ebooks on this site. Some of the books on this site are older and are therefore not helpful.


Programming eBooks:
 - Visual Studio .NET Macros and Add-ins
 - Computer Architecture and XML
 - XML Programming with dotNET
 - PHP and MySQL Programming
 - .NET Framework and Architecture
 - OOP and Visual Basic dotNET and Visual C#
 - ASP.NET Development
 - Visual C++ .NET
 - VB .NET Development

Networking and Security eBooks:
 - TCP-IP Basics
 - Network Security
 - Defending your Network
 - Defending your Website
 - Cisco IOS
 - Cisco Security
 - Ethernet

Database eBooks:
 - Database Design, Entity Relationships and Diagrams
 - Database Programming using JDBC and Java
 - Advanced Database Design

Operating System eBooks:
 - Linux Shell Scripting tutorial
 - Windows Server 2003 Deployment Resource Kit



Tags for this post>> | | |


Filed under: Free Computer and I.T. Books — computer_teacher @ 3:05 pm


July 17, 2008

50 Computer and Networking Security Videos

Here are 50 Computer Security Tutorial Videos hosted by security-freak.net. This site's author says that it is an attempt to lower the entry barrier for starting computer and network security research. Its objective is to present free videos to explain difficult security topics, such as raw sockets, packet injection, etc. This site will teach you many computer security topics, but it is left to the visitor to further pursue what is taught and to experiment and learn further.


Basic Socket Programming
4 Videos - 65 mins

Presentation on Socket Programming basics  (25 mins)
"Type with Me" exercise - a simple TCP server  (19 mins)
Coding a TCP Echo server  (13 mins)
Coding a TCP Echo client  (9 mins)


Packet Sniffing using Raw Sockets
7 Videos - 86 mins

Presentation on raw socket basics  (14 mins)
Sniffer coding basics  (15 mins)
Sniffer - Ethernet header parsing  (10 mins)
Sniffer - IP header parsing  (14 mins)
Sniffer - TCP header parsing  (10 mins)
Sniffer - Data parsing  (9 mins)
A look at Tcpdump and Ethereal  ( 14 mins)
 

Packet Injection using Raw Sockets

6 Videos - 75 mins

Packet injection basics presentation  (10 mins)
Your first packet injection program  (9 mins)
Ethernet header contruction & injection  (10 mins)
IP header construction & injection  (14 mins)
TCP header and data contruction & injection  (17 mins)
ARP Request query injector  ( 15 mins)

 
Architecture of A Proactive Security Tool
4 Videos - 43 mins

The "Sniff - Think - Inject" logic - a presentation  (10 mins)
Programming the Framework  (7 mins)
Communication via the Framework  ( 8 mins)
ARP DoS tool using the Framework  ( 18 mins)


Encryption Basics using RC4
3 Videos - 38 mins

RC4 basics presentation  (13 mins)
Understanding RC4 via simulations  (13 mins)
File encryption and decryption using RC4  ( 12 mins)
 

How do Worms work?
2 Videos - 46 mins

Understand the basics of worms - a presentation  (20 mins)
Scanning techniques used by worms - lets code  (26 mins)


Madwifi-NG Wireless Driver Compilation Basics

4 Videos - 36 mins

Madwifi-NG Basics Presentation  ( 8 mins)
Madwifi-NG Driver Compilation - Part 1  (10 mins)
Madwifi-NG Driver Compilation - Part 2  (10 mins)
Madwifi-NG Driver Compilation - Part 3  ( 8 mins)
Wireshark for Wireless LAN  (802.11)  (17 mins)


History of Hacking

5 Videos - 50 mins

Part 1  ( 10 mins)
Part 2  (9 mins)
Part 3  ( 10 mins)
Part 4  (10 mins)
Part 5  (10 mins)


Misc. Fun Videos on Security
1 Videos - 5 mins

Why do we need WPA? - a real world hacking example  ( 5 mins)
Q&A with Bruice Schneier at Defcon 15  (40 mins)
Hacking VMware  ( 50 mins)


Tutorials on commonly used Security Tools
11 Videos - 115 mins

Nmap  (13 mins)
Dig  (11 mins)
Netcat  (14 mins)
Airdecap-ng  (5 mins)
Ngrep  (8 mins)
Wireshark  (16 mins)
Nbtscan  (11 mins)
Airodump-NG  (12 mins)
Pcap2Air  ( 11 mins)
Prism-Strip  (5 mins)
Simple-Replay  (5 mins))



Tags for this post>> |


Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 7:15 pm


November 15, 2005

Free Books on Linux, MCSE, Security, Cisco, Flash, SAP, CIW, Cisco

Update: As of 12/05/05, this site is not longer available online.

This site contains many freely available computer books and ebooks covering the following areas: Internet, Networking, Security, Novell, Kylix, Flash MX, Linux, Red Hat Linux, Suse Linux, CIW, SAP, SQL, PHP, ComptTIA Server+, Microsoft MCSE Exams (including 70-290, 70-291, 70-294), Cisco (CCNA, CCNP, BCMSN, BSCN, CCDA, CCIE).

paradise.raleigh.nc.us/books

Subdirectories:
BOSON/
Flash/
Linux/
Microsoft/
cisco/

Web Security and Commerce.pdf  3.3M
(eBook) - Testkiller 70-218 - MCSA.pdf  651K
(ebook) Encylopedia of Networking.pdf  12M
(ebook) Building Internet Firewalls.pdf  1.4M
(ebook) insider secrets to successful ebay trading.pdf  68K
(ebook - pdf) Hacking IIS Servers.pdf  31K
(ebook pdf) Teach Yourself Perl in 21 Days.pdf  3.0M
2_TestKing Security+ Unencrypted.pdf  258K
50-653 Novell CNA.pdf  230K
70-216 TestKiller Ed5 Jan02 (1).pdf  897K
ACC-232_Wireless network.pdf  1.7M
Apache+SSL+PHP+fp.pdf  32K
Apache-Overview-HOWTO.pdf  142K
BrainBuzz Novell NetWare 5.1 Administration.pdf  258K
CCDA Exam Certification Guide.pdf 
CCDP Cisco Internetwork Design Study Guide.pdf 
CQS_VoIP_9e0-402_12.pdf  65K
CompTia Server+ TestKing SK0-001 Edition 2.pdf  383K
DOS_Command_Reference.pdf  50K
Developers_Guide Delphi Kylix.pdf  8.0M
Ebook - List of Free Ebook Sites.pdf  172K
Firewalls.pdf  1.5M
IPSEC.pdf 148K
MS-Press MCSE Training Kit - Exam 70-222.CHM
NSA - The 60 Minute Network Security Guide.pdf  235K
Novell CNA TESTKING 050-653.pdf  230K
COM and .Net Component Services.pdf  3.6M
Peer to Peer Harnessing the Power of Disruptive Technologies.pdf  2.1M
SQL in a Nutshell.pdf  1.5M
Building Internet Firewalls 2nd edition.pdf  4.9M
Essential SNMP.pdf  1.5M
TCPIP Network Administration.pdf  5.1M
QuickRefCard.pdf  68K
SAMS - Teach yourself DB2 universal database in 21 days.pdf  3.0M
SAMS Teach Yourself PHP4 in 24 Hours.pdf  2.5M
SAP - BAPI Programming.pdf  1.1M
SAP Getting Started.pdf  2.8M
SMS Handbook.pdf  282K
Securing-Optimizing-RH-Linux-1_2.pdf  2.6M
 Project Management Professional Study Guide.pdf  8.2M
Designing a Wireless Network.pdf  4.3M
1D0-470 CIW Security Professional v2.pdf  397K
CCNP 640-504 Q&A with Explanations 2.pdf  555K
CCNP 640-505 Q&A with Explanations 2.pdf  407K
CCNP 640-506 Q&A with Explanations 1.0.pdf  808K
70-088 Proxy Server v1.pdf  254K
310-011 Sun Solaris 8.0 System Administration I.pdf  491K
CheckPoint CCSA 156-210 Version 2.0.pdf  411K
The OSI Model.pdf  311K
Troy tech SQL Server 7.0 Admin 70-028 v2.01.pdf  257K
UnderstandingWirelessLANSecurity SECURITY ISSUES.pdf  495K
Wireless-HOWTO.pdf  77K
[ebook] - Computers - Networking - VoIP & Network Converage.pdf  419K
chronos.pdf  237K
e-book - Java 2 Network Security.pdf  5.6M
ebook - OReilly - TCPIP Network Administration.pdf  5.1M
ebook-pdf-Maximum_security.pdf  2.6M
grsecurity.pdf  276K
lpg-0.4.pdf  481K
CIW_foundations.pdf  372K
CIW_server_administrator.pdf  268K
tips.pdf


Tags for this post>> | | | | |


Filed under: Free Computer and I.T. Books — computer_teacher @ 8:04 pm


Powered by WordPress