دانلود هر آنچه که فکر نمایید

در این وبلاگ شما می توانید جدیدترین نرم افزار ، موزیک ، فیلم و کتاب های روز جهان را بدون هیچ گونه هزینه ای دانلود نمایید

دانلود هر آنچه که فکر نمایید

در این وبلاگ شما می توانید جدیدترین نرم افزار ، موزیک ، فیلم و کتاب های روز جهان را بدون هیچ گونه هزینه ای دانلود نمایید

کتاب Hacker's Delight

 

Caveat Emptor: The cost of software maintenance increases with the square of the programmer's creativity. First Law of Programmer Creativity, Robert D. Bliss, 1992 This is a collection of small programming tricks that I have come across over many years. Most of them will work only on computers that represent integers in two's-complement form. Although a 32-bit machine is assumed when the register length is relevant, most of the tricks are easily adapted to machines with other register sizes. This book does not deal with large tricks such as sophisticated sorting and compiler optimization techniques. Rather, it deals with small tricks that usually involve individual computer words or instructions, such as counting the number of 1-bits in a word. Such tricks often use a mixture of arithmetic and logical instructions. It is assumed throughout that integer overflow interrupts have been masked off, so they cannot occur. C, Fortran, and even Java programs run in this environment, but Pascal and ADA users beware! The presentation is informal. Proofs are given only when the algorithm is not obvious, and sometimes not even then. The methods use computer arithmetic, “floor” functions, mixtures of arithmetic and logical operations, and so on. Proofs in this domain are often difficult and awkward to express.....etc

http://rapidshare.de/files/13257946/thuyhu-large_1_.rar

کتاب Managing Your Business with Outlook 2003 For Dummies

 

Marcelo Thalenberg, "Managing Your Business with Outlook 2003 For Dummies", Wiley | ISBN 0764598155 | 2006 Year | PDF | ~6 Mb | 360 Pages

 

* Shows readers how to use Outlook as an effective and powerful solution for managing and organizing e-mail messages, schedules, tasks, notes, contacts, and other information as they are specifically applied in a business setting * Discusses managing and maintaining current customers and how to control customer interactions * Explains the process of using checklists and matching them with Outlook applications-from bulk mailing to planning a telemarketing campaign * Addresses how to build a prospect profile with an action plan for follow-up until the prospect becomes an active customer * Provides step-by-step examples on how to set up and use Business Contact Manager

 

Managing Your Business with Outlook 2003 For Dummies

کتاب Windows Server 2003 Security Cookbook

 

Mike Danseglio, Robbie Allen, "Windows Server 2003 Security Cookbook", Wiley | ISBN 0596007531 | 2005 Year | CHM | ~1 Mb | 520 Pages

 

In the last few years, security has become a hot-button issue for IT organizations of all sizes. Accordingly, many of the security features that were either optional or suspect in Windows 2000 have become solid, effective fixtures in Windows Server 2003-making it the most secure operating system Microsoft has ever produced. That is, if you know how to configure it properly.

The Windows Server 2003 Security Cookbook wants to make sure that you do know how. Picking up right where its predecessor, the Windows Server Cookbook, left off, this desktop companion is focused solely on Windows Server security. It teaches you how to perform important security tasks in the Windows Server 2003 OS using specific and adaptable recipes. Each recipe features a brief description of the problem, a step-by-step solution, and then a discussion of the technology at work. Whenever possible, the authors even tell you where to look for further information on a recipe.

The book is written in a highly modular format, with each chapter devoted to one or more technologies that Windows Server 2003 provides. This approach allows you to look up a task or scenario that you want to accomplish, find that page, and read that particular recipe only. Topics include:

System preparation and administration
Protecting the computer at the
TCP/IP level
Applying security options to Active Directory
Improving security on domain controllers
Securing DHCP controllers
Encrypting and signing network traffic using IPSec
Patch management

If you're an intermediate or advanced system administrator who wants to feel secure when deploying Windows Server 2003 and its related services, then you don't want to be without the Windows Server 2003 Security Cookbook.

 

Windows Server 2003 Security Cookbook

James Blunt - Chasing Time - The Bedlam Sessions Live

 

James Blunts compositions might be simple at some times but they're all different and have something special in each of 'em.
If you love Rock Acoustic you will love this album

01. (
00:03:49) James Blunt - Wiseman
02. (
00:03:56) James Blunt - High
03. (
00:03:44) James Blunt - Cry
04. (00:04:4 James Blunt - Goodbye My Lover
05. (
00:05:25) James Blunt - So Long, Jimmy
06. (
00:03:51) James Blunt - Sugar Coated
07. (00:03:3 James Blunt - You're Beautiful
08. (
00:03:47) James Blunt - Billy
09. (
00:02:42) James Blunt - Fall At Your Feet
10. (
00:04:17) James Blunt - Tears And Rain
11. (
00:03:37) James Blunt - No Bravery
12. (
00:04:07) James Blunt - Where Is My Mind

http://rapidshare.de/files/13280512/JBBl.rar