29.11.08

Thinking in C++ Download

Thinking in C++

VOL 1

1: Introduction to Objects

The progress of abstraction
An object has an interface
The hidden implementation
Reusing the implementation
Inheritance: reusing the interface
Interchangeable objects with polymorphism
Creating and destroying objects
Exception handling: dealing with errors
Analysis and design
Extreme programming
Why C++ succeeds
-A better C
-You’re already on the learning curve
-Efficiency
-Systems are easier to express and understand
-Maximal leverage with libraries
-Source-code reuse with templates
-Error handling
-Programming in the large
Strategies for transition

2: Making & Using Objects

The process of language translation
Tools for separate compilation
Declarations vs. definitions
Linking
Using libraries
Your first C++ program
More about iostreams
Introducing strings
Reading and writing files
Introducing vector

3: The C in C++

Creating functions
Controlling execution
Introduction to operators
Introduction to data types
Scoping
Specifying storage allocation
Operators and their use
Composite type creation
Debugging hints
Function addresses
Make: managing separate compilation

4: Data Abstraction

A tiny C-like library
What’s wrong?
The basic object
What’s an object?
Abstract data typing
Object details
Header file etiquette
Nested structures

5: Hiding the Implementation

Setting limits
C++ access control
Friends
Object layout
The class
Handle classes

6: Initialization & Cleanup

Guaranteed initialization with the constructor
Guaranteed cleanup with the destructor
Elimination of the definition block
Stash with constructors and destructors
Stack with constructors & destructors
Aggregate initialization
Default constructors

7: Function Overloading & Default Arguments

More name decoration
Overloading example
Default arguments
Choosing overloading vs. default arguments

8: Constants

Value substitution
Pointers
Function arguments & return values
Classes
volatile

9: Inline Functions

Preprocessor pitfalls
Inline functions
Stash & Stack with inlines
Inlines & the compiler
Reducing clutter
More preprocessor features
Improved error checking

10: Name Control

Static elements from C
Namespaces
Static members in C++
Static initialization dependency
Alternate linkage specifications

11: References & the Copy-Constructor

Pointers in C++
References in C++
The copy-constructor
Pointers to members

12: Operator Overloading

Warning & reassurance
Syntax
Overloadable operators
Non-member operators
Overloading assignment
Automatic type conversion

13: Dynamic Object Creation

Object creation
Early examples redesigned
Running out of storage
Overloading new & delete

14: Inheritance & Composition

Composition syntax
Inheritance syntax
The constructor initializer list
Combining composition & inheritance
Order of constructor & destructor calls
Name hiding
Functions that don’t automatically inherit
Choosing composition vs. inheritance
Operator overloading & inheritance
Multiple inheritance
Incremental development
Upcasting

15: Polymorphism & Virtual Functions

Evolution of C++ programmers
Upcasting
The problem
virtual functions
How C++ implements late binding
Why virtual functions?
Abstract base classes and pure virtual functions
Inheritance and the VTABLE
Overloading & overriding
virtual functions & constructors
Destructors and virtual destructors
Operator overloading
Downcasting

16: Introduction to Templates

Containers
Overview of templates
Template syntax
Stack and Stash as templates
Turning ownership on and off
Holding objects by value
Introducing iterators
Why iterators?

A: Coding Style
B: Programming Guidelines
C: Recommended Reading

VOL 2

Introduction
Part 1: Building Stable Systems
1: Exception handling
2: Defensive programming
Part 2: The Standard C++ Library
3: Strings in depth
4: Iostreams
5: Templates in depth
6: Generic algorithms
7: Generic containers
Part 3: Special Topics
8: Runtime type identification
9: Multiple inheritance
10: Design patterns
11: Concurrency
Appendix
A: Recommended reading
B: Etc
Download : zi

VOL 1

1: Introduction to Objects

The progress of abstraction
An object has an interface
The hidden implementation
Reusing the implementation
Inheritance: reusing the interface
Interchangeable objects with polymorphism
Creating and destroying objects
Exception handling: dealing with errors
Analysis and design
Extreme programming
Why C++ succeeds
-A better C
-You’re already on the learning curve
-Efficiency
-Systems are easier to express and understand
-Maximal leverage with libraries
-Source-code reuse with templates
-Error handling
-Programming in the large
Strategies for transition

2: Making & Using Objects

The process of language translation
Tools for separate compilation
Declarations vs. definitions
Linking
Using libraries
Your first C++ program
More about iostreams
Introducing strings
Reading and writing files
Introducing vector

3: The C in C++

Creating functions
Controlling execution
Introduction to operators
Introduction to data types
Scoping
Specifying storage allocation
Operators and their use
Composite type creation
Debugging hints
Function addresses
Make: managing separate compilation

4: Data Abstraction

A tiny C-like library
What’s wrong?
The basic object
What’s an object?
Abstract data typing
Object details
Header file etiquette
Nested structures

5: Hiding the Implementation

Setting limits
C++ access control
Friends
Object layout
The class
Handle classes

6: Initialization & Cleanup

Guaranteed initialization with the constructor
Guaranteed cleanup with the destructor
Elimination of the definition block
Stash with constructors and destructors
Stack with constructors & destructors
Aggregate initialization
Default constructors

7: Function Overloading & Default Arguments

More name decoration
Overloading example
Default arguments
Choosing overloading vs. default arguments

8: Constants

Value substitution
Pointers
Function arguments & return values
Classes
volatile

9: Inline Functions

Preprocessor pitfalls
Inline functions
Stash & Stack with inlines
Inlines & the compiler
Reducing clutter
More preprocessor features
Improved error checking

10: Name Control

Static elements from C
Namespaces
Static members in C++
Static initialization dependency
Alternate linkage specifications

11: References & the Copy-Constructor

Pointers in C++
References in C++
The copy-constructor
Pointers to members

12: Operator Overloading

Warning & reassurance
Syntax
Overloadable operators
Non-member operators
Overloading assignment
Automatic type conversion

13: Dynamic Object Creation

Object creation
Early examples redesigned
Running out of storage
Overloading new & delete

14: Inheritance & Composition

Composition syntax
Inheritance syntax
The constructor initializer list
Combining composition & inheritance
Order of constructor & destructor calls
Name hiding
Functions that don’t automatically inherit
Choosing composition vs. inheritance
Operator overloading & inheritance
Multiple inheritance
Incremental development
Upcasting

15: Polymorphism & Virtual Functions

Evolution of C++ programmers
Upcasting
The problem
virtual functions
How C++ implements late binding
Why virtual functions?
Abstract base classes and pure virtual functions
Inheritance and the VTABLE
Overloading & overriding
virtual functions & constructors
Destructors and virtual destructors
Operator overloading
Downcasting

16: Introduction to Templates

Containers
Overview of templates
Template syntax
Stack and Stash as templates
Turning ownership on and off
Holding objects by value
Introducing iterators
Why iterators?

A: Coding Style
B: Programming Guidelines
C: Recommended Reading

VOL 2

Introduction
Part 1: Building Stable Systems
1: Exception handling
2: Defensive programming
Part 2: The Standard C++ Library
3: Strings in depth
4: Iostreams
5: Templates in depth
6: Generic algorithms
7: Generic containers
Part 3: Special Topics
8: Runtime type identification
9: Multiple inheritance
10: Design patterns
11: Concurrency
Appendix
A: Recommended reading
B: Etc
Download : zi

VOL 1

1: Introduction to Objects

The progress of abstraction
An object has an interface
The hidden implementation
Reusing the implementation
Inheritance: reusing the interface
Interchangeable objects with polymorphism
Creating and destroying objects
Exception handling: dealing with errors
Analysis and design
Extreme programming
Why C++ succeeds
-A better C
-You’re already on the learning curve
-Efficiency
-Systems are easier to express and understand
-Maximal leverage with libraries
-Source-code reuse with templates
-Error handling
-Programming in the large
Strategies for transition

2: Making & Using Objects

The process of language translation
Tools for separate compilation
Declarations vs. definitions
Linking
Using libraries
Your first C++ program
More about iostreams
Introducing strings
Reading and writing files
Introducing vector

3: The C in C++

Creating functions
Controlling execution
Introduction to operators
Introduction to data types
Scoping
Specifying storage allocation
Operators and their use
Composite type creation
Debugging hints
Function addresses
Make: managing separate compilation

4: Data Abstraction

A tiny C-like library
What’s wrong?
The basic object
What’s an object?
Abstract data typing
Object details
Header file etiquette
Nested structures

5: Hiding the Implementation

Setting limits
C++ access control
Friends
Object layout
The class
Handle classes

6: Initialization & Cleanup

Guaranteed initialization with the constructor
Guaranteed cleanup with the destructor
Elimination of the definition block
Stash with constructors and destructors
Stack with constructors & destructors
Aggregate initialization
Default constructors

7: Function Overloading & Default Arguments

More name decoration
Overloading example
Default arguments
Choosing overloading vs. default arguments

8: Constants

Value substitution
Pointers
Function arguments & return values
Classes
volatile

9: Inline Functions

Preprocessor pitfalls
Inline functions
Stash & Stack with inlines
Inlines & the compiler
Reducing clutter
More preprocessor features
Improved error checking

10: Name Control

Static elements from C
Namespaces
Static members in C++
Static initialization dependency
Alternate linkage specifications

11: References & the Copy-Constructor

Pointers in C++
References in C++
The copy-constructor
Pointers to members

12: Operator Overloading

Warning & reassurance
Syntax
Overloadable operators
Non-member operators
Overloading assignment
Automatic type conversion

13: Dynamic Object Creation

Object creation
Early examples redesigned
Running out of storage
Overloading new & delete

14: Inheritance & Composition

Composition syntax
Inheritance syntax
The constructor initializer list
Combining composition & inheritance
Order of constructor & destructor calls
Name hiding
Functions that don’t automatically inherit
Choosing composition vs. inheritance
Operator overloading & inheritance
Multiple inheritance
Incremental development
Upcasting

15: Polymorphism & Virtual Functions

Evolution of C++ programmers
Upcasting
The problem
virtual functions
How C++ implements late binding
Why virtual functions?
Abstract base classes and pure virtual functions
Inheritance and the VTABLE
Overloading & overriding
virtual functions & constructors
Destructors and virtual destructors
Operator overloading
Downcasting

16: Introduction to Templates

Containers
Overview of templates
Template syntax
Stack and Stash as templates
Turning ownership on and off
Holding objects by value
Introducing iterators
Why iterators?

A: Coding Style
B: Programming Guidelines
C: Recommended Reading

VOL 2

Introduction
Part 1: Building Stable Systems
1: Exception handling
2: Defensive programming
Part 2: The Standard C++ Library
3: Strings in depth
4: Iostreams
5: Templates in depth
6: Generic algorithms
7: Generic containers
Part 3: Special Topics
8: Runtime type identification
9: Multiple inheritance
10: Design patterns
11: Concurrency
Appendix
A: Recommended reading
B: Etc

Download :

Thinking in C++ Thinking in C++2

p1 zip2

p1 zip2

25.11.08

ebook-Physics for Radiation Protection: A Handbook

James E. Martin “Physics for Radiation Protection: A Handbook"
Wiley-VCH | 2006-09-14 | ISBN: 3527406115 | 844 pages | PDF | 6,02 MB

A highly practical reference for health physicists and other professionals, addressing practical problems in radiation protection, this new edition has been completely revised, updated and supplemented by such new sections as log-normal distribution and digital radiography, as well as new chapters on internal radiation dose and the environmental transport of radionuclides.
Designed for readers with limited as well as basic science backgrounds, the handbook presents clear, thorough and up-to-date explanations of the basic physics necessary. It provides an overview of the major discoveries in radiation physics, plus extensive discussion of radioactivity, including sources and materials, as well as calculational methods for radiation exposure, comprehensive appendices and more than 400 figures. The text draws substantially on current resource data available, which is cross-referenced to standard compendiums, providing decay schemes and emission energies for approximately 100 of the most common radionuclides encountered by practitioners. Excerpts from the Chart of the Nuclides, activation cross sections, fission yields, fission-product chains, photon attenuation coefficients, and nuclear masses are also provided. Throughout, the author emphasizes applied concepts and carefully illustrates all topics using real-world examples as well as exercises.
A much-needed working resource for health physicists and other radiation protection professionals.



ebook-Echocardiography Board Review: 400 Multiple Choice Questions With Discussion (2008)

Echocardiography Board Review: 400 Multiple Choice Questions With Discussion
Publisher: Wiley | Language: English | ISBN:0470518227 | 196 pages | Data: 2008 | PDF | 4 Mb

Description: Obtaining an echocardiogram is a complex procedure with a need for constant enhancement and improvement of skills in the area for both ultrasound technician and physician.A^ Owing to the increasing complexity of the echocardiogram and its interpretation, upon which patient care heavily relies, various professional bodies have been introducing competency exams.

This unique book has been designed to assist new trainees as well as more experienced technicians and physicians in preparing for competency exams for certification purposes. It provides easy-to-use revision material in the form of multiple-choice questions with clearly explained answers.

* Unique approach to echocardiography in a question and answer format; the questions are predominantly case studies
* Features 400 questions with answers and explanations. The scope of the questions in the book is broad, including areas such as applied ultrasound physics, haemodynamics, valvular problems, ischaemic heart disease, congenital heart diseases, intraoperative or surgical echocardiography, pericardial diseases and cardiac masses.
* Excellent for test preparation
* Easy to read and understand
* Complements standard textbook reading
* Written by experienced academic echocardiographers involved in teaching echocardiography every day
* Over 200 still images enhance the learning process

Download:
Ziddu
or
Easy-Share

ebook-Network Security Essentials (2nd Edition)

Network Security Essentials (2nd Edition)
Publisher: Prentice Hall | Pages: 432 | 2002-11-20 | ISBN 0130351288 | PDF | 70 MB

This book provides a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards. This books covers e-mail security, IP security, Web security, and network management security. It also includes a concise section on the discipline of cryptography—covering algorithms and protocols underlying network security applications, encryption, hash functions, digital signatures, and key exchange. For system engineers, engineers, programmers, system managers, network managers, product marketing personnel, and system support specialists.

Magazine-India Today - 17/19 November 2008

India Today English (17-11-2008)
English | 92 Pages | 21.5 MB

Rapidshare
Depositfiles

Magazine-India Today - 24/26 November 2008

India Today English (24-11-2008)
English | 100 Pages | 35.3 MB

Rapidshare
Depositfiles

Magazine Furniture World Magazine - NOV DEC 2008

Furniture World Magazine - NOV DEC 2008
English | PDF | 8 MB | RS+ES

130 YEARS OF FURNITURE PUBLISHING

FURNITURE WORLD is the oldest continuously published trade publication in the United States. FURNITURE WORLD also established the Bernice Bienenstock Furniture Library in High Point NC, now a public foundation, which contains over 8,000 books on furniture and design dating from 1620. FURNITURE WORLD is designed to achieve long shelf life and maximum response for advertisers who are manufacturers of home furnishings products and suppliers of services to home furnishings retailers.

FURNITURE WORLD is read, not skimmed. That is why the magazine appeals to its target readers who are the owners, managers and buyers in retail furniture stores. These executives are looking for ways to market their products better and create store operating efficiencies.

R A P I D S H A R E

E A S Y S H A R E

Magazine-Computer Graphics World November 2008

Computer Graphics World November 2008
PDF | 52 pages | 11.7 Mb

rapidshare
easyshare
depositfiles

Magazine The Economist November 22 2008

The Economist November 22 2008
152 pages | PDF | 2.6 MB

E-S mirror

http://w18.easy-share.com/1702529975.html

Magazine-Bodyboard N82 October November 2008

Bodyboard N82 October November 2008
18Mb | 84 Pages | Scan | PDF | French

[RapidShare]

The Handbook of Fixed Income Securities, 6th Edition

For nearly two decades, individual and institutional investors have relied on The Handbook of Fixed Income Securities as the world’s leading reference for fixed income information. This new edition continues to define the field, while broadening its focus with new chapters on derivatives, a greater focus on structured finance and international markets, and more emphasis on applied material for today’s time-pressed practitioner. Influential editor Frank J. Fabozzi and today’s top fixed income authorities address the latest developments, financial instruments, and portfolio strategies.

DOWNLOAD HERE

Danger in Chess: How to Avoid Making Blunders

How to develop an early warning system, based on three main sources: outside (the opponent); inside (the player’s own thought process); and the stimulus itself (the board position). Author shows how to identify hazards, plus how detecting these signals can be used both defensively and offensively.

DOWNLOAD HERE

ebook-How to Make Money With Real Estate Options

Who says you have to spend money to make money?Savy real estate investors follow the examples of Donald Trump and Walt Disney, turning substantial profits on properties without incurring the debt, risk, and maintenance costs of ownership–and now, so can you!

In How to Make Money with Real Estate Options, real estate expert Thomas Lucier introduces you to the low-risk, high-yield investment vehicle that can earn big bucks even for small investors.

DOWNLOAD HERE

23.11.08

Diagnostic Neuroradiology ebook

Publisher: Springer
* Number Of Pages: 1288
* Publication Date: 2009-01
* ISBN-10 / ASIN: 3540756523
* ISBN-13 / EAN: 9783540756521
* Binding: Hardcover

Product Description:
In this monograph, the authors summarize their findings in complex neuroimaging work (cranio-, spondylo-, myelo- and angiography as well as CT and MR imaging of the brain and spine) during their longstanding experience at the N. Burdenko Neurosurgical Institute in Moscow. The book begins with a review of modern neuroimaging techniques: CT and MR angiography, perfusion and diffusion imaging, tractography, spectroscopy and functional MR imaging.

Download | Mirror

ebook Pediatric Nephrology in the ICU

* Publisher: Springer
* Number Of Pages: 296
* Publication Date: 2008-12
* ISBN-10 / ASIN: 3540744231
* ISBN-13 / EAN: 9783540744238
* Binding: Hardcover

Product Description:
This comprehensive book combines a review of the basic physiology and pathophysiology of each renal disorder and disease entity with state-of-the-art medical management guidelines based on evidence and expert opinion. Each chapter focuses on the unique and frequently challenging circumstances in pediatric patients, which are oftentimes very different from those in adult patients. Starting with a logical approach to each individual problem as seen in the ICU, it covers the pathophysiology of the child, the diagnostic approach and gives valuable up-to-date treatment recommendations.

Download | Mirror

21.11.08

Managing Online Forums dounload

managing online forums

Community is the cornerstone of our civilization. So it should come as no surprise that the World Wide Web has exploded into communities, large and small. While they may vary in every conceivable way, at their core, each on is just a gathering of people sitting around a camp?re, telling each other stories. It was around just such a camp?re that I met Patrick, and so it seem ?tting that I’m here introducing his ?rst book, which just so happens to about managing your own community.
Building your own community can be one of the most enjoyable journey
you can take as a Webmaster. You are giving people a place to meet and
connect, share their ideas and thoughts, and build relationships that grow ou
of common experiences. Building a community is about creating a fun, saf
place that encourages expression and conversation.
As a professional programmer myself, I’ve always found the technica
aspects of running a community pretty simple. But if you aren’t a programme
then you and Patrick have a lot in common! He couldn’t program his way ou
of a paper bag. So it’s a good thing that you don’t need to know how to
program to run your own community. Inside the pages of this book, Patrick
gives you great insight into all the skills you’ll need to get up and running and
manage your community. This includes managing users, an area where you
are likely to spend most of your time and a subject I’ve learned a lot abou
from Patrick over the years.

Download

CIA The World Factbook [2007] Download

What’s New!
- Country information has been updated as of 13 December 2007.
- Several notable geographic changes have occurred. The US Board on Geographic Names (BGN) now recognizes Timor-Leste as the short form name for East Timor; its description may be found under this new designation. France’s overseas possessions were recently reorganized. The five former entities of Bassas da India, Europa Island, Glorioso Islands, Juan de Nova Island, and Tromelin Island, previously grouped as Iles Eparses (Scattered Islands), now constitute a district of the French Southern and Antarctic Lands. Additionally, the islands of St. Barthelemy and St. Martin, formerly a part of the French overseas region of Guadeloupe, now make up separate overseas collectivities and have their own Factbook entries.
-In the Economy category, three new fields have been added that focus on capital stocks and investment. They are “Stock of direct foreign investment - at home,” “Stock of direct foreign investment - abroad,” and “Market value of publicly traded shares.”
- In the Government category, the “Capital” entry has been greatly expanded and now contains up to four subfields, including significant new information having to do with time. The subfields consist of the name of the capital itself, its geographic coordinates, the time difference at the capital from coordinated universal time (UTC), and, if applicable, information on daylight saving time (DST). Where appropriate, a special note has been added to highlight those countries that have multiple time zones.

DownloadLink:

http://rapidshare.com/files/84566320/cia.world.factbook.2007.full.version.rar

Complete Intelligence Tests ebook

The Complete Book of Intelligence Tests: 500 Exercises to Improve, Upgrade and Enhance
Your Mind Strength

Book Description:

Enjoyable mental exercises to help boost performance on IQ tests

This engaging book offers readers the ultimate in calisthenics for the brain.

Using the same fun, informative, and accessible style that have made his previous
books so popular, Philip Carter helps people identify mental strengths and weaknesses,
and provides methods for improving memory, boosting creativity, and tuning in to
emotional intelligence. Featuring never-before-published tests designed specifically
for this book, plus answers for all questions, this latest treasure trove from a MENSA
puzzle editor outlines a fun, challenging program for significantly enhancing performance
in all areas of intelligence.

DownloadLink:

http://rapidshare.com/files/84567083/Complete.Intelligence.Tests.rar

19.11.08

ebook-Kaplan TOEFL Listening Practice

This audio CD is an excellent tool for any and everyone getting ready for and aiming at the TOEFL test. It provides both trainers and students working on their own with a wide and extensive range of listening material typically found in the listening section of the TOEFL test.

Some of those preparing for international exams such as the TOEFL need extra practice for the listening section and it is not that easy to find supplementary material focusing on that specific aspect. As an experienced trainer in the corporate and academic (international exams) world, I strongly recommend this as very good supplementary material, for TOEFL preparation or even for those interested in improving their listening skills in American English.

However, I should say that the reason why I gave it 4 stars and not 5 is because it does not come with any scripts or accompanying exercises, which would definitely optimize the recorded material and its results. Therefore, trainers should develop their own activities in order to maximise results.

http://rapidshare.com/files/105528822/Kaplan_TOEFL_Listening_Practice.rar

ebook-Delmar’s Pediatric Nursing Care Plans, 3rd Edition

Delmar’s Pediatric Nursing Care Plans, Third Edition, provides detailed information on developing care plans for children with health alterations. Each care plan presents information to guide users in developing comprehensive, individualized nursing care plans based on solid, scientific knowledge. Care plans solicit specific client data and prompt the user to individualize the interventions and evaluate the child’s individual responses. Interventions and outcomes are suggested to keep parents informed of and involved in their child’s care.

http://rapidshare.com/files/93441056/Delmars_Pediatric_Nursing.rar

15.11.08

Lynda.com ZBrush 3 For Windows Essential Training

Lynda.com ZBrush 3 For Windows Essential Training DVDR | 850 MB

Pixologic’s ZBrush 3 stands at the forefront of digital 3D sculpting and 2.5D painting, a new medium that is taking the art and entertainment worlds by storm. Visual effects artist Eric Keller shares his expertise and talents in ZBrush 3 for Windows Essential Training. He presents the concepts behind digital sculpting, shows how to produce fantastic images using the unique ZBrush toolset and interface, and demonstrates the power of the Digital Clay and Sculpting brushes. To offer a richer understanding of the application, Eric gives a guided tour of the interface and addresses the most common problems experienced by new users. Exercise files accompany the course.

Download

http://netfolder.in/folder.php?folder_id=MTAxNjI

OR

http://uploaded.to/?id=x1q87n

ebook- Gnomon Workshop: Photo Retouching in Adobe Photoshop

Gnomon Workshop: Photo Retouching in Adobe Photoshop [Tutorial] | 570 MB
Trainer: Meghan FARRELL | Product Code: MFA01 | 157 Minutes of Lecture | For Windows and Mac
With this DVD you will learn the step-by-step process of using Adobe Photoshop® retouching techniques to transform and prepare images for production level commercial photography. Meghan Farrell will walk you through the steps of retouching a fashion shoot as a basis for learning the primary skill sets to make skin and hair look flawless without looking artificial. You will learn how to retouch and maintain natural skin, hair and hands and reshape the body. You’ll be introduced to indispensable methods of using adjustment layers, layer masks and color correction. The techniques demonstrated in this DVD will help you retouch like a professional, whether working on your own images or for those of a client. The cutting edge techniques demonstrated in this DVD will help you stand out when seeking work in this fast-paced industry.

1. SETTING PREFERENCES
We begin by establishing some basic Photoshop® settings to allow us to work more fluently once we get started.
2. COLOR CORRECTING
Working with adjustment layers and masks is really the only way to color correct images in the professional setting. Having a st rong knowledge of how to use masks quickly will be one of your strongest assets when working in the world of photographic retouching.
3. SKIN RETOUCHING
Using the healing brush and the clone stamp set at various dark/light settings is your best bet for fast touch ups. We are going to be focusing a lot on skin. Remove any large blemishes first and then focus on balancing tone.
4. KEEPING SKIN NATURAL
For a flawless yet naturally textured look, the burn and dodge tool is the only way to go. Star t by burning in the areas that are too light and dodging out the areas that are too dark unt il the skin is a balanced neutral tone. This goes for zoomed in as well as zoomed out.
5. EYES AND SURROUNDING AREA
Use the dodge and burn, clone and healing brush tool to clean up, reshape and sculpt the eye area. Emphasizing the iris and pupil will create a more dramatic look. Always remove the red from the eye whites, but don’t “white-out” the whites, keep the ball of the eye looking spherical.
6. HAIR AND MORE
Using the brush tool set to a low opacity is great for painting in hair strands. Use the clone stamp or copy and paste method for larger areas of hair. Be sure to match the surrounding areas of hair for color, density and sharpness so nothing stands out as unnatural.
7. REVIEWING SKIN TECHNIQUES
On our second image we will review some of the basics learned in the previous chapters for natural skin clean up.
8. SKIN FOLDS
Skin folds include anything from armpits to hand creases. In this chapter I’ll go over how to smooth and refine the armpit area to create a very natural subtle armpit line. Remember to keep your lines straight and apply the basic skin techniques to the surrounding armpit area.
9. REMOVING OBJECTS FROM THE BACKGROUND
Once you have removed the object from the background, focus on rebuilding that background so it blends in with the rest of the image. Keep your lines straight. Pay special attention to where tones change and fade into each other. Using the clone tool set to a medium opacity will help you achieve natural looking results.
10. HANDS AND HAIR REVIEW
Even well manicured hands can look rough once photographed, so pay special attention to fingernails, cuticles, knuckles and veins. Clone stamp set to lighten will give you natural looking knuckles.
11. BODY MORPHING
Using the Liquify filter opens up a new world of possibilities. Learn here how to gently reshape a figure for natural results. Liquify is also a great asset for smoothing lines close-up and can be used on the image as a whole or on selected areas.
12. INTENSIFYING OBJECTS AND SHAPES
Using special techniques to intensify objects gives directors that “POP!” they are looking for.
13. CHANGING COLORS OF SELECTED AREAS
Sometimes you may need to change the color of an object in an advertisement, especially if the ad is for something that comes in more than one color. Having a good understanding of adjustment layers is essential.

About the Instructor:
Meghan Paddock Farrell received a BFA in Photography from Rhode Island College. Her understanding of the color darkroom process as well as her background in fine art informs her ability to accurately manipulate color, capture the 3D human form and translate these through lighting effects into the 2D space. As the Senior Retoucher at the publishing house of Weider Publications, she oversaw, enhanced and brought tens of thousands of images to a production level, print-ready, status. Her work has been published in hundreds of magazines including Glamour, Allure, Vanity Fair, Los Angeles Magazine, Shape Magazine as well as many more domestic and international titles and advertisements. She has also worked as retoucher at Getty Images, SuperColor Hollywood, and for notable fashion photographers Guilano Bekor, Norman Jean Roy and Ondrea Barbe. Currently she works as an independent contractor for several advertisers and publications including OPI, VIV and others.

The Minimum System Requirements are:
1GHz or faster processor
512 MB RAM
64 MB Video RAM
DVD-ROM Drive
5 GB of hard disk space
1280 x 1024 display

The Minimum Operating System Requirements are:
Microsoft® Windows® XP Professional,
Microsoft Windows 2000 Professional
Apple® Mac® OS X 10.2

This DVD-ROM also requires the Quicktime Movie Player (Version 5.0.5 or higher), and Acrobat Reader (Version 5.0 or higher) in order to view its contents.

Sample Video:
http://uploaded.to/file/9c8a4v/mfa01_lc.mov

More Info:
http://www.thegnomonworkshop.com/dvds/mfa01.html

Download
http://uploaded.to/file/mncupn/Gnomon.Workshop.Photo.Retouching.in.Adobe.Photoshop.part1.rar
http://uploaded.to/file/ckjy24/Gnomon.Workshop.Photo.Retouching.in.Adobe.Photoshop.part2.rar
http://uploaded.to/file/ng3kf3/Gnomon.Workshop.Photo.Retouching.in.Adobe.Photoshop.part3.rar
http://uploaded.to/file/zjujca/Gnomon.Workshop.Photo.Retouching.in.Adobe.Photoshop.part4.rar
http://uploaded.to/file/18eksa/Gnomon.Workshop.Photo.Retouching.in.Adobe.Photoshop.part5.rar
http://uploaded.to/file/gg3bnq/Gnomon.Workshop.Photo.Retouching.in.Adobe.Photoshop.part6.rar

Software ebook-Security Engineering: A Guide for Project Managers

Julia H. Allen, Sean Barnum, Robert J. Ellison, Gary McGraw, Nancy R. Mead “Software Security Engineering: A Guide for Project Managers”
Addison-Wesley Professional | 2008-05-11 | ISBN: 032150917X | 368 pages | CHM | 1,7 Mb
Software that is developed from the beginning with security in mind will resist, tolerate, and recover from attacks more effectively than would otherwise be possible. While there may be no silver bullet for security, there are practices that project managers will find beneficial. With this management guide, you can select from a number of sound practices likely to increase the security and dependability of your software, both during its development and subsequently in its operation.
Software Security Engineering draws extensively on the systematic approach developed for the Build Security In (BSI) Web site. Sponsored by the Department of Homeland Security Software Assurance Program, the BSI site offers a host of tools, guidelines, rules, principles, and other resources to help project managers address security issues in every phase of the software development life cycle (SDLC). The book’s expert authors, themselves frequent contributors to the BSI site, represent two well-known resources in the security world: the CERT Program at the Software Engineering Institute (SEI) and Cigital, Inc., a consulting firm specializing in software security.

This book will help you understand why
Software security is about more than just eliminating vulnerabilities and conducting penetration tests
Network security mechanisms and IT infrastructure security services do not sufficiently protect application software from security risks
Software security initiatives should follow a risk-management approach to identify priorities and to define what is “good enough”–understanding that software security risks will change throughout the SDLC
Project managers and software engineers need to learn to think like an attacker in order to address the range of functions that software should not do, and how software can better resist, tolerate, and recover when under attack
depositfiles.com

easy-share

13.11.08

WEB DRAGONS: INSIDE THE MYTHS OF SEARCH ENGINE TECHNOLOGY

In the eye-blink that has elapsed since the invoke of the millennium, the lives of those of us who impact with aggregation hit been utterly transformed. Pretty substantially every we requirement to undergo is on the web; if not today, then tomorrow. It’s where we see and play, class and do business, ready up with older friends and foregather newborn ones. What makes it doable for us to encounter the clog we requirement to know? Search engines.

Search engines - “web dragons” - are the portals finished which we admittance society’s riches treasure of information. How do they arrange up against librarians, the gatekeepers over centuries past? What persona module libraries endeavor in a concern whose aggregation is ruled by the web? How is the scheme organized? Who controls its contents, and how do they do it? How do see engines work? How crapper scheme saliency be misused by those who poverty to delude us their wares? What’s reaching tomorrow, and crapper we impact it? We are witnessing the daybreak of a newborn era, play correct today - and this aggregation shows you what it module countenance same and how it module modify your world.

Do you ingest see engines every day? Are you a developer or a librarian, serving others with their aggregation needs? A scientist or writer for whom the scheme has denaturized the rattling artefact you work? An online trafficker or place designer, whose occupation exists because of the web? Whoever you are: if you tending most information, this aggregation module unstoppered your eyes - and attain you blink.

About the authors:
Ian H. Witten is academic of organisation power at the University of Waikato, where he directs the New Sjaelland Digital Library investigate project. He has publicised widely on digital libraries, organisation learning, book compression, hypertext, style reasoning and act processing, and organisation typography. A man of the ACM, he has cursive individual books, including How to Build a Digital Library (2002) and Data Mining (2005), both from moneyman Kaufmann.

Marco Gori is academic of organisation power at the University of Siena, where he leads the staged info investigate group. He is the Chairman of the European Chapter of the IEEE Computational Intelligence Society, a man of the IEEE and of the ECCAI, and past President of the European Association for Artificial Intelligence.

Teresa Numerico teaches meshwork theory and act studies at the University of leaders 3, and is a scientist in Philosophy of Science at the University of Salerno. Previously she was engaged as a playing utilization and marketing trainer for different media companies, including the European division of historiographer Broadcasting System (CNN and Cartoon Network).

* Presents a grave analyse of the intent of funneling aggregation admittance finished a diminutive containerful of gateways and the idea of a centralised index–and the problems that haw cause.

* Provides auspicious approaches for addressing the problems, much as the personalization of scheme services.

* Presented by polity in the earth of digital libraries, scheme history, organisation learning, and scheme and accumulation mining.

* Find more aggregation at the author’s site: webdragons.net.

Download:

http://w13.easy-share.com/1698835481.html

SEO: SEARCH ENGINE OPTIMIZATION BIBLE

This in-depth Scripture delivers the blessed goblet of online marketing: how to impact see engine results to intend online shoppers to limited Web sites; the impact is titled see engine improvement (SEO) and it is a blistering topic
One-stop inventiveness offers readers what they requirement to organisation and compel a flourishing SEO

program, including multipurpose tips on uncovering the direct routes to success, strategy suggestions, and sidebars with more aggregation and added resources
Features interviews with executives from crowning see companies, nonnegative appendices on creating flourishing listings with Google, MSN, Yahoo!, and others
Topics allow creating an SEO plan; managing keywords; increasing pay-per-click strategies; discernment the persona of course and linking; robots, spiders, and crawlers; maintaining SEO; analyzing success rates; and such more

http://mihd.net/6g5m82

http://rapidshare.com/files/91368198/0470175001.7z

11.11.08

ebook Intrusion Detection: Network Security Beyond the Firewall

Wiley | 1998-09-17 | ISBN: 0471290009 | 368 pages | HTML | 2,3 Mb

A complete nuts-and-bolts guide to improving network security using today's best intrusion detection products
Firewalls cannot catch all of the hacks coming into your network. To properly safeguard your valuable information resources against attack, you need a full-time watchdog, ever on the alert, to sniff out suspicious behavior on your network. This book gives you the additional ammo you need. Terry Escamilla shows you how to combine and properly deploy today's best intrusion detection products in order to arm your network with a virtually impenetrable line of defense. He provides:
* Assessments of commercially available intrusion detection products: what each can and cannot do to fill the gaps in your network security
* Recommendations for dramatically improving network security using the right combination of intrusion detection products
* The lowdown on identification and authentication, firewalls, and access control
* Detailed comparisons between today's leading intrusion detection product categories
* A practical perspective on how different security products fit together to provide protection for your network

Download:

http://depositfiles.com/files/8007541

http://rapidshare.com/files/145820015/Intr_Detection.rar

Maximum Linux Security (2nd Edition) ebook

896 pages | Sams; 2nd edition (June 21, 2001) | ISBN: 0672321343 | PDF | 4 Mb

Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation is designed for system administrators, managers, or Linux users who wish to protect their Linux servers and workstations from unauthorized intrusions and other external threats to their systems' integrity. Written by an experienced hacker--someone who knows which systems are vulnerable and how crackers get into them--this unique guide to Linux security identifies existing and potential security holes and faults, and then describes how to go about fixing them.

Download:

http://www.paid4share.net/file/9147/9780672321344-0672321343-rar.html

http://depositfiles.com/files/8333937

Google Hacks 3rd Edition ebook

O'Reilly | Aug 2006 | English | ISBN: 0596527063 | 543 pages | CHM | 5.55 MB

Now that new features and services such as Google Maps, Google Talk, and Google Desktop have been added to the expanding Google universe, we've made the third edition of this bestseller into an infinitely more useful book for this powerful search engine. You'll not only find dozens of hacks for new Google services, but plenty of updated tips, tricks and scripts for hacking the old ones.

Everyone knows that Google lets you search billions of web pages. But few people realize that Google also gives you hundreds of cool ways to organize and play with information.

Since we released the last edition of this bestselling book, Google has added many new features and services to its expanding universe: Google Earth, Google Talk, Google Maps, Google Blog Search, Video Search, Music Search, Google Base, Google Reader, and Google Desktop among them. We've found ways to get these new services to do even more.

The expanded third edition of Google Hacks is a brand-new and infinitely more useful book for this powerful search engine. You'll not only find dozens of hacks for the new Google services, but plenty of updated tips, tricks and scripts for hacking the old ones. Now you can make a Google Earth movie, visualize your web site traffic with Google Analytics, post pictures to your blog with Picasa, or access Gmail in your favorite email client. Industrial strength and real-world tested, this new collection enables you to mine a ton of information within Google's reach.

For those of you concerned about Google as an emerging Big Brother, this new edition also offers advice and concrete tips for protecting your privacy. Get into the world of Google and bend it to your will!

Download:

http://depositfiles.com/files/8814623

http://rapidshare.com/files/160204685/Google_Hacks_3rd_Edition.zip

9.11.08

Cisco Router Configuration ebook

Use Internet Explorer and access the START.html file.

File: Cd1_Vol-1_Cisco_Router_Configuration.rar
DownloadLink:
http://rapidshare.com/files/161819545/Cd1_Vol-1_Cisco_Router_Configuration.rar

CCNA1 - Tutorial in HTML file

Use Internet Explorer browser with Flash-player plugin.

File: CCNA_1.rar
DownloadLink:
http://rapidshare.com/files/161830118/CCNA_1.rar

Download MCSE Training Guide: Networking Essentials

MCSE Training Guide: Networking Essentials (Covers Exam #70-058)

Description:
Organized in a concise, easy-to-read manner, this must-have resource saves users countless hours and thousands of dollars in training courses. This Microsoft-approved, comprehensive training guide contains test questions, tables, notes, tips, and step-by-step exercises to completely prepare you for the Networking Essentials exam. Exclusive TestPrep software simulates actual exam.
The fastest, most effective, and least expensive study tool for achieving Microsoft certification
Loaded with insider tips, notes, and strategies from MCSEs and Microsoft Certified Trainers
CD-ROM contains several Windows 95 and Windows NT test engines with hundreds of questions to prepare users for the actual tests.

Download:
http://rapidshare.com/files/45297734/b36_ByMechoDownload.rar

password:
mechodownload

Other MCSE/MCSA stuff found here:
http://rapidshare.com/users/A53IT1/5

Mirrors


MCSE Training Guide: Networking Essentials Full Download

MCSE Training Guide: Networking Essentials Direct Download