Google

Wednesday, December 19, 2007

Toward a Safer and More Secure Cyberspace (2007)

Toward a Safer and More Secure Cyberspace (2007)

Given the growing importance of cyberspace to nearly all aspects of national life, a secure cyberspace is vitally important to the nation, but cyberspace is far from secure today. The United States faces the real risk that adversaries will exploit...

More

Strategy for an Army Center for Network Science, Technology, and Experimentation (2007)

Strategy for an Army Center for Network Science, Technology, and Experimentation (2007)

More

Strategic Management of Information and Communication Technology: The United States Air Force Experience with Y2K (2007)

Strategic Management of Information and Communication Technology: The United States Air Force Experience with Y2K (2007)

Although Y2K did not result in major disruptions, the event is a rich source of critical lessons for strategic management of information and communication technology (ICT), many of which apply to large organizations today. Using a case study approach...

More

Software for Dependable Systems: Sufficient Evidence? (2007)

Software for Dependable Systems: Sufficient Evidence? (2007)

More

Improving Disaster Management: The Role of IT in Mitigation, Preparedness, Response, and Recovery (2007)

Improving Disaster Management: The Role of IT in Mitigation, Preparedness, Response, and Recovery (2007)

Information technology (IT) has the potential to play a critical role in managing natural and human made disasters. Damage to communications infrastructure, along with other communications problems exacerbated the difficulties in carrying out...

More

Engaging Privacy and Information Technology in a Digital Age (2007)

Engaging Privacy and Information Technology in a Digital Age (2007)

Privacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly boundaryless options for collecting, saving, sharing, and comparing information trigger consumer worries. Online practices of...

More

Proceedings of a Workshop to Review PATH Strategy, Operating Plan, and Performance Measures

Proceedings of a Workshop to Review PATH Strategy, Operating Plan, and Performance Measures

More

Advanced Research Instrumentation and Facilities

Advanced Research Instrumentation and Facilities

In recent years, the instrumentation needs of the nation�s research communities have changed and expanded. The need for particular instruments has become broader, crossing scientific and engineering disciplines. The growth of interdisciplinary...

More

Protecting Building Occupants and Operations from Biological and Chemical Airborne Threats: A Framework for Decision Making (2007)

Protecting Building Occupants and Operations from Biological and Chemical Airborne Threats: A Framework for Decision Making (2007)

Protecting buildings and their occupants from biological and chemical attacks to ensure continuous building operations is seen as an urgent need in the Department of Defense, given recent technological advances and the changing threats. Toward this...

More

An Assessment of the National Institute of Standards and Technology Information Technology Laboratory: Fiscal Year 2007 (2007)

An Assessment of the National Institute of Standards and Technology Information Technology Laboratory: Fiscal Year 2007 (2007)

The report on the ITL presents a general assessment of the laboratory including a look at its research strategies, opportunities, planning for growth, research culture, and computing infrastructure; and provides assessments of the laboratory�s six...

More

Sunday, August 26, 2007

Linux and Unix Books for ONLINE reading

Computer Security Books

O'Reilly_-_Practical_Unix_&_Internet_Security,_3rd_Edition.rar -: Click Here to Download :-

O'Reilly_-_Secure_Coding._Principles_and_Practices.rar -: Click Here to Download :-

Personal_Firewalls_for_Administrators_and_Remote_Users.rar -: Click Here to Download :-

Sams_-_Maximum_Security,_Fourth_Edition.rar -: Click Here to Download :-

Securing-Optimizing-Linux-RH-Edition.tar.tar -: Click Here to Download :-

Securing-Optimizing-Linux-The-Ultimate-Solution.tar.tar -: Click Here to Download :-

Addison_Wesley_-_Enterprise_Security._The_Manager's_Defense.rar -: Click Here to Download :-

Addison_Wesley_-_Have_You_Locked_the_Castle_Gate.rar -: Click Here to Download :-

Building_Internet_Firewalls,_2nd_edition_(pdf).zip -: Click Here to Download :-

Building_Internet_Firewalls_-_O_Reilly_(HTML).zip -: Click Here to Download :-

Building_Internet_Firewalls_ebook_(chm).zip -: Click Here to Download :-

Firewalling_with_netfilter_iptables.zip -: Click Here to Download :-

Vector Math for 3D Computer Graphics

This is a tutorial on vector algebra and matrix algebra from the viewpoint of computer graphics. It covers most vector and matrix topics needed to read college-level computer graphics text books. Most graphics texts cover these subjects in an appendix, but it is often too short. This tutorial covers the same material at greater length, and with many examples.

· Chapter 0 — Points and Lines
· Chapter 1 — Vectors, Points, and Column Matrices
· Chapter 2 — Matrix Addition
· Chapter 3 — Vector Addition
· Chapter 4 — Vector Length
· Chapter 5 — Vectors Direction
· Chapter 6 — Scaling and Unit Vectors
· Chapter 7 — The Dot Product
· Chapter 8 — Length and the Dot Product
· Chapter 9 — The Angle between Two Vectors.
· Chapter 10 — The Angle between 3D Vectors.
· Chapter 11 — Projecting one Vector onto Another.
· Chapter 12 — Vector Cross Product.
· Chapter 13 — Matrices and Simple Matrix Operations.
· Chapter 14 — Matrix-Column Matrix Multiplicaton.
· Chapter 15 — Matrix-Matrix Multiplication
· Chapter 16 — Identity Matrix and Matrix Inverse
· Index

API Specifications


Standard Edition





Enterprise Edition





Micro Edition


Javacard


Java Web Services


XML
XML


Other Technologies








Other Technologies

J2ME and Gaming

J2ME and Gaming

Teaches programming with J2ME on wireless devices with focus on developing games.