Custom Search

Monday, March 16, 2009

Satellite Communications Systems Engineering: Atmospheric Effects, Satellite Link Design and System


Provides an invaluable, detailed and up-to-date coverage of atmospheric effects and their impact on satellite communications systems design and performance.

Significant progress has been made in the last decade in the understanding and modelling of propagation effects on radio wave propagation in the bands utilized for satellite communications.

This book provides a comprehensive descriptio ...

download

Wednesday, March 4, 2009

C++ Cookbook


Product Description
Despite its highly adaptable and flexible nature, C++ is also one of the more complex programming languages to learn. Once mastered, however, it can help you organize and process information with amazing efficiency and quickness.

The “C++ Cookbook” will make your path to mastery much shorter. This practical, problem-solving guide is ideal if you’re an engineer, programmer, or researcher writing an application for one of the legions of platforms on which C++ runs. The algorithms provided in “C++ Cookbook” will jump-start your development by giving you some basic building blocks that you don’t have to develop on your own.

Less a tutorial than a problem-solver, the book addresses many of the most common problems you’re likely encounter–whether you’ve been programming in C++ for years or you’re relatively new to the language. Here are just some of the time-consuming tasks this book contains practical solutions for:

Reading the contents of a directory

Creating a singleton class

Date and time parsing/arithmetic

String and text manipulation

Working with files

Parsing XML

Using the standard containers

Typical of O’Reilly’s “Cookbook” series, “C++ Cookbook” is written in a straightforward format, featuring recipes that contain problem statements and code solutions, and apply not to hypothetical situations, but those that you’re likely to encounter. A detailed explanation then follows each recipe in order to show you how and why the solution works. This question-solution-discussion format is a proven teaching method, as any fan of the “Cookbook” series can attest to. This book will move quickly to the top of your list of essential C++ references.

Download

linux shell scripting tutorial - a beginner's handbook.pdf

This tutorial is designed for beginners who wish to learn the basics of shell scripting/programming plus
introduction to power tools such as awk, sed, etc. It is not help or manual for the shell; while reading this
tutorial you can find manual quite useful (type man bash at $ prompt to see manual pages). Manual
contains all necessary information you need, but it won't have that much examples, which makes idea
more clear. For this reason, this tutorial contains examples rather than all the features of shell.

Download

100 linux tips & tricks.pdf

100 linux tips & tricks.pdf

* Chapter 2 covers installation of Linux. These are tips and tricks useful when installing Linux itself or any new program. Some tips will cover new means of installing Linux on non-typical hardware, others will explain how to take Linux distributions from an FTP server and make your own CD-ROM with them, or where to find Linux CD-ROMs for as little as $2.
* Chapter 3 covers hardware related matters. You will learn tips there on how to get your non-PostScript compatible printer to work, or how to get a sound card detected.
* Chapter 4 covers software. You will find tips there about all kinds of Linux software, including where to find and how to install the Java Development Kit port, and everything about the Pine mail and news program.
* Chapter 5 covers networking in all its forms. There you will see how to setup a PPP connection quickly, without editing all of the configuration files yourself, as well as some nice programs that were made to ease dialup procedures. You will also see tricks on how to make your local LAN network without unexpected problems.
* Chapter 6 is the last chapter but covers an important part of Linux: development. Here you will find a lot of tips on how to write powerful scripts to make your system easier to handle, and a full overview of what to do and what you don’t want to do in C to avoid problems like memory leaks, and how to allow easy scalability.

Download

Microsoft Office Access 2007: The Complete Reference


The Ultimate Microsoft Office Access 2007 Resource

Build a highly responsive a database so you can track, report, and share information and make more informed decisions. This comprehensive resource shows you how to design and develop custom Access 2007 databases--even if you have little or no programming experience. You'll learn to collect data from a variety of sources, share it securely with others, and integrate it with other Office applications.

Filled with detailed, easy-to-follow instructions, Microsoft Office Access 2007: The Complete Reference shows you how to take full advantage of all the new features, including the new ribbon user interface and navigation pane, new field types, and more. Create a reliable and versatile information management solution with help from this all-inclusive guide. As a bonus, you can gain hands-on experience by following along with the book's sample databases on the CD-ROM.
*Customize the user interface to suit your preferences
*Use the built-in database templates or design your own
*Create, modify, and relate tables
*Enter and edit data
*Write advanced queries to extract and manipulate information
*Create customized forms and reports
*Improve performance and back up your database
*Develop macros to carry out automated responses to user actions
*Import, link, and export data
*Enable a multiple-user environment
*Secure your database

Download

e-book pdf - java - core servlets and jsp.pdf


This book is aimed at serious software developers. This is not a book that
touts the potential of e-commerce or pontificates about how Web-enabled
applications will revolutionize your business. Instead, it is a hands-on book
aimed at helping programmers who are already convinced of the need for
dynamic Web sites get started building them right away. In showing how to
build these sites, I try to illustrate the most important approaches and warn
you of the most common pitfalls. Along the way, I include plenty of working
code: more than a hundred documented Java classes, for instance. I try to
give detailed examples of the most important and frequently used features,
summarize the lesser-used ones, and refer you to the APIs (available
on-line) for a few of the rarely used ones.
Nor is this a book that skims dozens of technologies at a high level.
Although I don’t claim that this is a definitive reference on every technology
it touches on (e.g., there are a number of books this size just on JDBC), if the
book covers a topic, it does so in enough detail for you to sit down and start
writing real programs. The one exception to this rule is the Java programming
language itself. Although I don’t assume any familiarity with server-side programming,
I do expect you to be familiar with the basics of Java language
development. If you’re not, you will need to pick up a good tutorial like Core
Java, Core Web Programming, or Thinking in Java.

Download

e-book - Java 2 Network Security.pdf

As the person who led the JavaSoft team that developed the Java security
technology discussed in this book, it is extremely gratifying to see people
spend their precious time writing about our technology and products. Every
engineer’s dream is to have his or her technology deployed and used by
thousands of others, and this book is a great help to Java developers who
write security-aware applications.
Security is a difficult subject to write about. On the one hand, security is in
people’s daily consciousness so that it appears easy to get across (to the
reader) some of the basic concepts. On the other hand, security applied to
computer and networking is often subtle and unexpected. Security also is
pervasive in that it touches all aspects of the computing technology, including
hardware, software, operating system, software libraries, communication
software, networking infrastructure, application software, user interface, and
management software. In order to understand security in any situation, one
has to understand the entire system under consideration as well as each
individual component so that one can identity their strengths and weaknesses
and design the appropriate solutions.
Java security is one of the more recent additions to the family of security
technologies. Ever since Sun Microsystems announced Java technology in
the spring of 1995, there has been strong and growing interest (in industry,
research laboratories, and academia) around the security of the Java platform
as well as new security issues raised by the deployment of Java technology.
Such close attention being paid to security is almost unprecedented in that
new computing technologies normally ignore security considerations when
they emerge initially. Most of them remain unsecured forever. In the few cases
where efforts are made to secure them later, the efforts are typically not very
successful because retrofitting security is usually very difficult, if possible at
all, and often causes backward compatibility problems.
Therefore, it is extremely fortunate that the Java technology had security as a
primary design goal from the very beginning. (Hats off to the original Java
development team. I joined JavaSoft only in 1996.) Although the initial
security model was ve

Download