Given the growing importance of cyberspace to nearly all aspects of national life, a secure cyberspace is vitally important to the nation, but cyberspace is far from secure today. The United States faces the real risk that adversaries will exploit...
MoreWednesday, December 19, 2007
Strategic Management of Information and Communication Technology: The United States Air Force Experience with Y2K (2007)
Although Y2K did not result in major disruptions, the event is a rich source of critical lessons for strategic management of information and communication technology (ICT), many of which apply to large organizations today. Using a case study approach...
MoreImproving Disaster Management: The Role of IT in Mitigation, Preparedness, Response, and Recovery (2007)
Information technology (IT) has the potential to play a critical role in managing natural and human made disasters. Damage to communications infrastructure, along with other communications problems exacerbated the difficulties in carrying out...
MoreEngaging Privacy and Information Technology in a Digital Age (2007)
Privacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly boundaryless options for collecting, saving, sharing, and comparing information trigger consumer worries. Online practices of...
MoreAdvanced Research Instrumentation and Facilities
In recent years, the instrumentation needs of the nation�s research communities have changed and expanded. The need for particular instruments has become broader, crossing scientific and engineering disciplines. The growth of interdisciplinary...
MoreProtecting Building Occupants and Operations from Biological and Chemical Airborne Threats: A Framework for Decision Making (2007)
Protecting buildings and their occupants from biological and chemical attacks to ensure continuous building operations is seen as an urgent need in the Department of Defense, given recent technological advances and the changing threats. Toward this...
MoreAn Assessment of the National Institute of Standards and Technology Information Technology Laboratory: Fiscal Year 2007 (2007)
The report on the ITL presents a general assessment of the laboratory including a look at its research strategies, opportunities, planning for growth, research culture, and computing infrastructure; and provides assessments of the laboratory�s six...
MoreSunday, August 26, 2007
Linux and Unix Books for ONLINE reading
The Linux Network Administrator's Guide, Second Edition by Olaf Kirch and Terry Dawson
The Linux System Administrators' Guide by Lars Wirzenius, Joanna Oja, and Stephen Stafford
Linux From Scratch by Gerard Beekmans
The Linux Development Platform by Rafeeq Ur Rehman and Christopher Paul
Linux Consultants Guide by Joshua Drake
Introduction to Linux - A Hands on Guide by Machtelt Garrels
EVMS User Guide by Christine Lorenz, IBM, Joy Goodreau, IBM, Kylie Smith, IBM
Linux Kernel 2.4 Internals by Tigran Aivazian
Linux in Workplace by SSC, Inc, published by No Starch Press
Securing and Optimizing Linux by Gerhard Mourani
Learning GNU C by Ciaran O'Riordan
Advanced Bash-Scripting Guide by Mendel Cooper
Apache Compile HOWTO by Luc de Louw
The Bugzilla Guide by Matthew P. Barnson
Linux Newbie Administrator Guide by Stan, Peter and Marie Klimas
Introduction to Backing Up and Restoring Data by Jennifer Vesperman
Introduction to Intrusion Protection and Network Security by Jennifer Vesperman
Introduction to Physical Security and Security of Services by Jennifer Vesperman
Introduction to Securing Data in Transit by Jennifer Vesperman
Introduction to Viruses & Virus Hoaxes by Jennifer Vesperman
Iptables-tutorial by Oskar Andreasson
The Linux Kernel Module Programming Guide by Peter Jay Salzman and Ori Pomerantz
Pocket Linux Guide by David Horton
Windows+BSD+Linux Installation Guide by Subhasish Ghosh
DocBook: The Definitive Guide by Norman Walsh and Leonard Muellner
Picking Up Perl by Bradley M. Kuhn
Bash Reference Manual by FSF
Using Samba, 2nd Edition by Jay Ts, Robert Eckstein, and David Collier-Brown
Computer Security Books
O'Reilly_-_Practical_Unix_&_Internet_Security,_3rd_Edition.rar -: Click Here to Download :-
O'Reilly_-_Secure_Coding._Principles_and_Practices.rar -: Click Here to Download :-
Personal_Firewalls_for_Administrators_and_Remote_Users.rar -: Click Here to Download :-
Sams_-_Maximum_Security,_Fourth_Edition.rar -: Click Here to Download :-
Securing-Optimizing-Linux-RH-Edition.tar.tar -: Click Here to Download :-
Securing-Optimizing-Linux-The-Ultimate-Solution.tar.tar -: Click Here to Download :-
Addison_Wesley_-_Enterprise_Security._The_Manager's_Defense.rar -: Click Here to Download :-
Addison_Wesley_-_Have_You_Locked_the_Castle_Gate.rar -: Click Here to Download :-
Building_Internet_Firewalls,_2nd_edition_(pdf).zip -: Click Here to Download :-
Building_Internet_Firewalls_-_O_Reilly_(HTML).zip -: Click Here to Download :-
Building_Internet_Firewalls_ebook_(chm).zip -: Click Here to Download :-
Firewalling_with_netfilter_iptables.zip -: Click Here to Download :-
Vector Math for 3D Computer Graphics
This is a tutorial on vector algebra and matrix algebra from the viewpoint of computer graphics. It covers most vector and matrix topics needed to read college-level computer graphics text books. Most graphics texts cover these subjects in an appendix, but it is often too short. This tutorial covers the same material at greater length, and with many examples.
· | Chapter 0 | — Points and Lines |
· | Chapter 1 | — Vectors, Points, and Column Matrices |
· | Chapter 2 | — Matrix Addition |
· | Chapter 3 | — Vector Addition |
· | Chapter 4 | — Vector Length |
· | Chapter 5 | — Vectors Direction |
· | Chapter 6 | — Scaling and Unit Vectors |
· | Chapter 7 | — The Dot Product |
· | Chapter 8 | — Length and the Dot Product |
· | Chapter 9 | — The Angle between Two Vectors. |
· | Chapter 10 | — The Angle between 3D Vectors. |
· | Chapter 11 | — Projecting one Vector onto Another. |
· | Chapter 12 | — Vector Cross Product. |
· | Chapter 13 | — Matrices and Simple Matrix Operations. |
· | Chapter 14 | — Matrix-Column Matrix Multiplicaton. |
· | Chapter 15 | — Matrix-Matrix Multiplication |
· | Chapter 16 | — Identity Matrix and Matrix Inverse |
· | Index |
API Specifications
Other Technologies
J2ME and Gaming
Teaches programming with J2ME on wireless devices with focus on developing games.