The Linux Network Administrator's Guide, Second Edition by Olaf Kirch and Terry Dawson
The Linux System Administrators' Guide by Lars Wirzenius, Joanna Oja, and Stephen Stafford
Linux From Scratch by Gerard Beekmans
The Linux Development Platform by Rafeeq Ur Rehman and Christopher Paul
Linux Consultants Guide by Joshua Drake
Introduction to Linux - A Hands on Guide by Machtelt Garrels
EVMS User Guide by Christine Lorenz, IBM, Joy Goodreau, IBM, Kylie Smith, IBM
Linux Kernel 2.4 Internals by Tigran Aivazian
Linux in Workplace by SSC, Inc, published by No Starch Press
Securing and Optimizing Linux by Gerhard Mourani
Learning GNU C by Ciaran O'Riordan
Advanced Bash-Scripting Guide by Mendel Cooper
Apache Compile HOWTO by Luc de Louw
The Bugzilla Guide by Matthew P. Barnson
Linux Newbie Administrator Guide by Stan, Peter and Marie Klimas
Introduction to Backing Up and Restoring Data by Jennifer Vesperman
Introduction to Intrusion Protection and Network Security by Jennifer Vesperman
Introduction to Physical Security and Security of Services by Jennifer Vesperman
Introduction to Securing Data in Transit by Jennifer Vesperman
Introduction to Viruses & Virus Hoaxes by Jennifer Vesperman
Iptables-tutorial by Oskar Andreasson
The Linux Kernel Module Programming Guide by Peter Jay Salzman and Ori Pomerantz
Pocket Linux Guide by David Horton
Windows+BSD+Linux Installation Guide by Subhasish Ghosh
Picking Up Perl by Bradley M. Kuhn
Bash Reference Manual by FSF
Using Samba, 2nd Edition by Jay Ts, Robert Eckstein, and David Collier-Brown
Sunday, August 26, 2007
Linux and Unix Books for ONLINE reading
Computer Security Books
O'Reilly_-_Practical_Unix_&_Internet_Security,_3rd_Edition.rar -: Click Here to Download :-
O'Reilly_-_Secure_Coding._Principles_and_Practices.rar -: Click Here to Download :-
Personal_Firewalls_for_Administrators_and_Remote_Users.rar -: Click Here to Download :-
Sams_-_Maximum_Security,_Fourth_Edition.rar -: Click Here to Download :-
Securing-Optimizing-Linux-RH-Edition.tar.tar -: Click Here to Download :-
Securing-Optimizing-Linux-The-Ultimate-Solution.tar.tar -: Click Here to Download :-
Addison_Wesley_-_Enterprise_Security._The_Manager's_Defense.rar -: Click Here to Download :-
Addison_Wesley_-_Have_You_Locked_the_Castle_Gate.rar -: Click Here to Download :-
Building_Internet_Firewalls,_2nd_edition_(pdf).zip -: Click Here to Download :-
Building_Internet_Firewalls_-_O_Reilly_(HTML).zip -: Click Here to Download :-
Building_Internet_Firewalls_ebook_(chm).zip -: Click Here to Download :-
Firewalling_with_netfilter_iptables.zip -: Click Here to Download :-
Vector Math for 3D Computer Graphics
This is a tutorial on vector algebra and matrix algebra from the viewpoint of computer graphics. It covers most vector and matrix topics needed to read college-level computer graphics text books. Most graphics texts cover these subjects in an appendix, but it is often too short. This tutorial covers the same material at greater length, and with many examples.
· | Chapter 0 | — Points and Lines |
· | Chapter 1 | — Vectors, Points, and Column Matrices |
· | Chapter 2 | — Matrix Addition |
· | Chapter 3 | — Vector Addition |
· | Chapter 4 | — Vector Length |
· | Chapter 5 | — Vectors Direction |
· | Chapter 6 | — Scaling and Unit Vectors |
· | Chapter 7 | — The Dot Product |
· | Chapter 8 | — Length and the Dot Product |
· | Chapter 9 | — The Angle between Two Vectors. |
· | Chapter 10 | — The Angle between 3D Vectors. |
· | Chapter 11 | — Projecting one Vector onto Another. |
· | Chapter 12 | — Vector Cross Product. |
· | Chapter 13 | — Matrices and Simple Matrix Operations. |
· | Chapter 14 | — Matrix-Column Matrix Multiplicaton. |
· | Chapter 15 | — Matrix-Matrix Multiplication |
· | Chapter 16 | — Identity Matrix and Matrix Inverse |
· | Index |
API Specifications
Other Technologies
J2ME and Gaming
Teaches programming with J2ME on wireless devices with focus on developing games.
Action Arcade Adventure Set: The Best Way to Create Action Arcade Games in C
Shows how to create side-scroller games in a way that anyone who has programmed in C can undertand.
Michael Abrash's Graphics Programming Black Book
From the person who optimized Quake himself, features assembler optimization on graphics programming using Intel CPUs, from the 8088 on to the early Pentium lines.
Monday, August 6, 2007
Introduction to Computer Science using Java
Compilation of lecture notes which cover most of a beginning course in computer science using Java in CSCU Computer Science Department.
Introduction To Programming With Java
An undergraduate text in the theory of programming languages.
Structure and Interpretation of Computer Programs - Video Lectures
Videos of 20 introduction lectures to the subject of Computer Science given in 1986 for Hewlett-Packard employees, converted in its entirety into Mpeg and DivX formats. The lecture uses Lisp dialect and syntax but it doesn't formally teach the language.