Celebrating its 25th aniversary, Microsoft Press Books is offering 2 free ebooks of the month for your reading pleasure. Not sure on this one but Microsoft tend to bring down their free downloads after sometime, so if you want to take advantage of this offer, grab these ebooks quick. Simply login with your current MSN / Hotmail ID and follow with the onscreen instructions.
2 Free Microsoft Press Ebook Resource Kit And Visual C# 2008 Express Edition
Free ASP.NET MVC eBook Tutorial : NerdDinner ASP.NET MVC Tutorial

NerdDinner ASP.NET MVC Tutorial
This free tutorial / chapter-ebook is the first chapter from the ebook ASP.NET MVC 1.0, written by Scott Hanselman. This first chapter is a 185 page end-to-end tutorial that walks-through building a small, but complete, ASP.NET MVC application from scratch. This 14MB PDF file is available for download totally free and is licensed under a Creative Commons Attribution No Derivatives license which means you can share, distribute, print, or hand it out to anyone.
The application the tutorial builds is called “NerdDinner”. It provides an easy way for people to organize, host and search for new topic-based dinners online. For more information click on the link below to read the full description of this free chapter, get the PDF ebook and the full source code for this project.
Progamming ebook 5 edition for easy learning
Packt turned 5 a couple of months ago, so this is quite an old news, but nothing’s old if it’s something good isn’t? I have a feeling this might be one of those ‘time-restricted’ offers, but I’d love to be proved wrong. That kind of issue should be the least of your problems, hence why you should run over to the site and grab their excellent offers right now. Of course, you can provide support by purchasing the paperback if you like the ebook. The titles include:-
- Building Online Communities with phpBB 2
- Upgrading to Lotus Notes and Domino 7
- Invision Power Board: A User Guide
- Building Websites with e107
- The PEAR Installer Manifesto
Tutorial ebook : How to Build an Online Forum in 9 Easy Steps
How to Build an Online Forum in 9 Easy Steps
“Build an Online Forum in 9 Easy Steps”, is a complete walk-through on how to successfully install and promote an internet forum. Using a forum he made for his friends and him to stay in touch as an example, author RJ Licata takes you through the process in an easy to understand, step-by-step system. If you have a similar desire to hang out with your college buddies, or talk gossip with the ladies, but don’t seem to have the time anymore, this ebook is for you. In this ebook you’ll learn how to:
- Choose and register a domain name for your forum
- Create a hosting account to store your site on the web
- Install the free forum software on your hosting account
- Setup and modify the forum to meet your needs
- Use your forum to earn you money
- And more!
C# Development for Beginner
Advances in Cryptology - EUROCRYPT 2009: 28th Annual International Conference

The 33 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 148 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications. The papers are organized in topical sections on security, proofs, and models, hash cryptanalysis, group and broadcast encryption, cryptosystems, cryptanalysis, side channels, curves, and randomness.
Advances in Cryptology
Cryptography in C and C++, 2 Ed

This expanded, improved second edition includes about 100 pages of new material as well as numerous improvements to the original text.
The chapter about random number generation has been completely rewritten, and the latest cryptographic techniques are covered in detail. Furthermore, this book covers the recent improvements in primality testing.
More Info | Info Mirror | Mirror
Graph Algorithms And Applications 5 (No 5)

This book contains Volume 7 of the "Journal of Graph Algorithms and Applications" (JGAA). JGAA is a peer-reviewed scientific journal devoted to the publication of high-quality research papers on the analysis, design, implementation, and applications of graph algorithms. Areas of interest include computational biology, computational geometry, computer graphics, computer-aided design, computer and interconnection networks, constraint systems, databases, graph drawing, graph embedding and layout, knowledge representation, multimedia, software engineering, telecommunications networks, user interfaces and visualization, and VLSI circuit design. "Graph Algorithms and Applications 4" presents contributions from prominent authors and includes selected papers from the Seventh International Workshop on Algorithms and Data Structures (WADS 2001) and the 2001 Symposium on Graph Drawing (GD 2001). All papers in the book have extensive diagrams and offer a unique treatment of graph algorithms focusing on the important applications.
More Info | Get Mirror
Core Security Patterns: Best Practices and Strategies for J2EE(TM), Web Services, and Identity Management

Core Security Patterns is the hands-on practitioner™s guide to building robust end-to-end security into J2EE™ enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. Written by three leading Java security architects, the patterns-driven approach fully reflects today™s best practices for security in large-scale, industrial-strength applications.
The authors explain the fundamentals of Java application security from the ground up, then introduce a powerful, structured security methodology; a vendor-independent security framework; a detailed assessment checklist; and twenty-three proven security architectural patterns. They walk through several realistic scenarios, covering architecture and implementation and presenting detailed sample code. They demonstrate how to apply cryptographic techniques; obfuscate code; establish secure communication; secure J2ME™ applications; authenticate and authorize users; and fortify Web services, enabling single sign-on, effective identity management, and personal identification using Smart Cards and Biometrics.
Core Security Patterns covers all of the following, and more:
- What works and what doesn™t: J2EE application-security best practices, and common pitfalls to avoid
- Implementing key Java platform security features in real-world applications
- Establishing Web Services security using XML Signature, XML Encryption, WS-Security, XKMS, and WS-I Basic security profile
- Designing identity management and service provisioning systems using SAML, Liberty, XACML, and SPML
- Designing secure personal identification solutions using Smart Cards and Biometrics
- Security design methodology, patterns, best practices, reality checks, defensive strategies, and evaluation checklists
- End-to-end security architecture case study: architecting, designing, and implementing an end-to-end security solution for large-scale applications
Programing Spider,bots and Aggregators in JAVA

You will quickly build on your basic knowledge of Java to quickly master the techniques that are essential to this specialized world of programming, including parsing HTML, interpreting data, working with cookies, reading and writing XML, and managing high-volume workloads. You'll also learn about the ethical issues associated with bot use--and the limitations imposed by some websites.
This book offers two levels of instruction, both of which are focused on the library of routines provided on the companion CD. If your main concern is adding ready-made functionality to an application, you'll achieve your goals quickly thanks to step-by-step instructions and sample programs that illustrate effective implementations. If you're interested in the technologies underlying these routines, you'll find in-depth explanations of how they work and the techniques required for customization.
Download Ebook
Mastering Microsoft Visual Basic 2008

The Visual Basic book programmers count on
You can build rich, data-driven Windows applications and Web programs without endless coding if you use the right tools. This expert guide covers what you need to know to program with Visual Basic 2008, employ the latest Visual Studio 2008 tools, and operate efficiently within the .NET Framework.
In a clear, easy-to-follow style, the book moves from in-depth explanations to practicalinstruction to real-world examples. You'll thoroughly explore basic coding in VB 2008and learn to build interfaces without coding by using Visual Studio 2008's drag-and-drop visual tools. You'll get up to speed on Language Integrated Query (LINQ), the new component in .NET Framework 3.5, and you'll handle key tasks such as programming TreeView controls, encrypting data, and much more.
Enhance your skills in Visual Basic 2008 and the Visual Studio 2008 environment with the new edition of this bestselling guide.
Coverage includes:
*Understanding custom classes, controls, and other aspects of object-oriented programming
*Processing strings, characters, events, lists, and dates
*Designing forms with menus, and creating applications with multiple forms
*Printing business reports with headers, footers, and page numbers
*Exploring XML object serialization and XML Web services
*Querying databases and presenting data to users
*Programming basic objects of ADO.NET
*Harnessing ASP.NET 3.5 and developing Web applications
*Master the New Features in Visual Basic 2008, .NET Framework 3.5, and Visual Studio 2008
*Build a Custom, Practical Application from the Techniques in This Book
*Test, Debug, and Deploy a Variety of Applications in Visual Studio 2008
*Explore the New Vista Interface and How It Affects VB Programming
*Reinforce Your Programming Skills with Numerous Real-World Examples
Download Ebook
Integrated HTML and CSS: A Smarter, Faster Way to Learn

Integrated HTML and CSS,you'll learn about:
* Writing well-structured HTML for use by any web-capable device
* Designing page layouts using CSS
* Controlling fonts, colors, backgrounds, borders, and margins
* Using lists to create attractive, button-like menus
* Using images as backgrounds, links, page content, and decoration
* Creating and styling forms
* Personalizing your weblog
* Understanding and applying design and usability principles
* Publishing and testing your pages
* Validating your code
* Making pages accessible to all visitors
Integrated HTML and CSS
HTML & CSS in Pictures

this book you'll learn HTML basics, understand layout and navigation, employ style sheets, enable interactivity, master advanced output, and more.
HTML & CSS in Pictures
Teach Yourself CSS in 10 Minutes

Author Russ Weakley is a well-respected member of the CSS community and is known for his ability to make complicated concepts easy-to-understand for even inexperienced CSS users. With this book, you will cover the essentials for standards compliant techniques that are supported by the most common browsers. Once you master the basics, Weakley will also take you inside positioning, troubleshooting CSS, and handling common CSS bugs. Sams Teach Yourself CSS in 10 Minutes is the ultimate quick learning tool and handy desk reference guide to CSS.
More Info | Mirror
Pro PHP XML and Web Services More Easy for Beginner

Author Robert Richards, a major contributor to the PHP XML codebase, is a leading expert in the PHP community. In this book, Richards covers all topics in depth, blending theory with practical examples. You'll find case studies for the most popular web services like Amazon, Google, eBay, and Yahoo. The book also covers XML capabilities, demonstrated through informative examples, in the PEAR libraries.
Free Download Ebook
Core Java 2, Volume II: Advanced Features (5th Edition)

Core Java, Volume 2, Fifth Edition offers all-new discussions of XML and servlets, plus thoroughly revamped coverage of many advanced features -- from collections to native methods, security to Swing. Cay Horstmann begins with thoroughly updated coverage of JDK 2 Version 1.3 multithreading, collections, and networking. He presents a detailed chapter on advanced database integration utilizing the JDBC API; completely revised coverage of remote objects; advanced techniques for utilizing JavaBeans; and much more. The book contains advanced techniques for building GUIs with both AWT and Swing; internationalizing software; and leveraging the latest Java security model.
Core Java 2, Volume II
The Microsoft Expression Web Developer's Guide to ASP.NET 3.5: Learn to create ASP.NET applications using Visual Web Developer

Mikhail Arkhipov
Principal Development Manager – Web Development Tools
Microsoft Corporation
Expression Web introduced ASP.NET to a new group of web developers. This book is designed to help you start using ASP.NET right away to add powerful new features to your website. Don’t worry, you won’t have to learn a lot of programming; instead, you’ll create an ASP.NET application from start to finish using Visual Web Developer 2008, while writing only a very small amount of actual programming code.
DETAILED INFORMATION ON HOW TO…
• Create and work with websites in Visual Web Developer 2008
• Use the different compilation and code models in ASP.NET
• Configure ASP.NET security and other settings
• Use ASP.NET master pages and user controls
• Take advantage of ASP.NET membership features for a password-protected website
• Use form validation in ASP.NET
• Use CSS, skins, and themes
• Access, edit, and add data to a database using ASP.NET
• Send email using ASP.NET
• Use Ajax and ASP.NET Web services
• Debug and troubleshoot ASP.NET
. . . and much more!
More Information
Part1 | Part2
Teach Yourself ASP.NET Ajax in 24 Hours More Easy And Faster to Learn
One step at a time, you’ll discover how to make the most of the Microsoft Ajax Library and Ajax Server Extensions. You’ll develop secure, reliable Web services and applications that solve real problems--including a complete sample e-commerce application.
More Information | Mirror
Visual Basic - Learn Visual Basic to Easy
Coding in GUI environment is quite a transition to traditional, linear programming methods where the user is guided through a linear path of execution and is limited to small set of operations. In GUI environment, the number of options open to the user is much greater, allowing more freedom to the user and developer. Features such as easier comprehension, user-friendliness, faster application development and many other aspects such as introduction to ActiveX technology and Internet features make Visual Basic an interesting tool to work with.
Visual Basic (VB) was developed from the BASIC programming language. In the 1970s, Microsoft started developing ROM-based interpreted BASIC for the early microprocessor-based computers. In 1982, Microsoft QuickBasic revolutionized Basic and was legitimized as a serious development language for MS-DOS environment. Later on, Microsoft Corporation created the enhanced version of BASIC called Visual Basic for Windows.
source : Read more...
Applied Cryptanalysis: Breaking Ciphers in the Real World
Applied Cryptanalysis focuses on practical attacks on real-world ciphers. Using detailed case studies, the authors demonstrate how modern cryptographic systems are broken, and they do so with a minimum of complex mathematics and technical jargon. All major classes of attacks are covered, providing IT professionals with the knowledge necessary for effective security implementation within their organizations. Each chapter concludes with a series of problems that enables the reader to practice and fine-tune their own cryptanalysis skills. Applied Cryptanalysis can serve as a textbook for a cryptanalysis course or for independent study.
The text is organized around four major themes:
* Classic Crypto offers an overview of a few classical cryptosystems, introducing and illustrating the basic principles, concepts, and vocabulary. The authors then cover World War II cipher machines, specifically the German Enigma, Japanese Purple, and American Sigaba.
* Symmetric Ciphers analyzes shift registers and correlation attacks, as well as attacks on three specific stream ciphers: ORYX, RC4 (as used in WEP), and PKZIP. In addition, block ciphers are studied: Hellman's Time-Memory Trade-Off attack is discussed and three specific block ciphers are analyzed in detail (CMEA, Akelarre, and FEAL).
- Hash Functions presents hash function design, birthday attacks, and the "Nostradamus" attack. Then the MD4 attack is examined, which serves as a precursor for the authors' highly detailed analysis of the recent attack on MD5.
- Public Key Crypto includes an overview of several public key cryptosystems including the knapsack, Diffie-Hellman, Arithmetica, RSA, Rabin cipher, NTRU, and ElGamal. Factoring and discrete log attacks are analyzed, and the recent timing attacks on RSA are discussed in detail.
- Clear and concise, this practical case-based approach to cryptanalysis is a valuable and timely resource.