Pages

Tuesday, 10 December 2013

Computer Design Fundamental by Morris Mano (pdf)

click here to download.......
Computer is an advanced electronic device that takes raw data as input from the user and processes these data under the control of set of instructions (called program) and gives the result (output) and saves output for the future use.This Computer Fundamentals tutorial covers a foundational understanding of computer hardware, software, operating systems, peripherals, etc., and how to get the most value and impact from computer technology.

Memory Or Storage Unit:

This unit can store instructions, data and intermediate results. This unit supplies information to the other units of the computer when needed. It is also known as internal storage unit or main memory or primary storage or Random access memory(RAM).
Its size affects speed, power and capability. There are primary memory and secondary memory, two types of memories in the computer. Functions of Memory Unit are:
  • It stores all the data to be processed and the instructions required for processing.
  • It stores intermediate results of processing.
  • It stores final results of processing before these results are released to an output device.
  • All inputs and outputs are transmitted through main memory.

Control Unit




A Hand book of DATA STRUCTURE by Sartaj sahni (pdf)

click here to download this book (pdf).... 
A data structure is a specialized format for organizing and storing data. General data structure types include the array, the file, the record, the table, the tree, and so on. Any data structure is designed to organize data to suit a specific purpose so that it can be accessed and worked with in appropriate ways. In computer programming, a data structure may be selected or designed to store data for the purpose of working on it with various algorithm
In computer science, a data structure is a particular way of storing and organizing data in a computer so that it can be used efficiently.
Different kinds of data structures are suited to different kinds of applications, and some are highly specialized to specific tasks. For example, B-trees are particularly well-suited for implementation of databases, while compiler implementations usually use hash tables to look up identifiers.
Data structures provide a means to manage large amounts of data efficiently, such as large databases and internet indexing services. Usually, efficient data structures are a key to designing efficient algorithms. Some formal design methods and programming languages emphasize data structures, rather than algorithms, as the key organizing factor in software design. Storing and retrieving can be carried out on data stored in both main memory and in secondary memory.

8085 Micrprocesser Architecture and Programming...

               click here to download(pdf).....
A MICROPROCESSOR incorporates the functions of a computer's central processing unit (CPU) on a single integrated circuit (IC), or at most a few integrated circuits. All modern CPUs are microprocessors making the micro- prefix redundant. The microprocessor is a multipurpose, programmable device that accepts digital data as input, processes it according to instructions stored in its memory, and provides results as output. It is an example of sequential digital logic, as it has internal memory. Microprocessors operate on numbers and symbols represented in the binary numeral system.
The advent of low-cost computers on integrated circuits has transformed modern society. General-purpose microprocessors in personal computers are used for computation, text editing, multimedia display, and communication over the Internet. Many more microprocessors are part of embedded systems, providing digital control over myriad objects from appliances to automobiles to cellular phones and industrial process control.
Intel introduced its first 4-bit microprocessor 4004 in 1971 and its 8-bit microprocessor 8008 in 1972. During the 1960s, computer processors were constructed out of small and medium-scale ICs—each containing from tens of transistors to a few hundred. These were placed and soldered onto printed circuit boards, and often multiple boards were interconnected in a chassis. The large number of discrete logic gates used more electrical power—and therefore produced more heat—than a more integrated design with fewer ICs. The distance that signals had to travel between ICs on the boards limited a computer's operating speed.
In the NASA Apollo space missions to the moon in the 1960s and 1970s, all onboard computations for primary guidance, navigation and control were provided by a small custom processor called "The Apollo Guidance Computer". It used wire wrap circuit boards whose only logic elements were three-input NOR gates.

Monday, 9 December 2013

TOP 10 TECH CEO of all the time-

#10: Ming Kai Tsai
       

COMPANY:   MediaTek Inc

MediaTek Inc. is a fabless semiconductor company that provides system-on-chip solutions for smartphones, tablets, optical drives, digital televisions, set-top boxes, GPS units, Wi-Fi routers and Bluetooth devices. Headquartered in Hsinchu, Taiwan, the company has 25 offices worldwide and is one of the top 25 semiconductor suppliers globally by sales volume.
Since its founding in 1997, MediaTek has democratized the global market for smartphones, among other products, through the creation of turnkey chipset solutions. The solutions comprise comprehensive software and hardware components designed to enable equipment makers to focus less on engineering and more on establishing brand identity and recognition. MediaTek also provides its customers with reference designs and directions on how to implement its solutions.

visit mediaTek website... 


#9: Tim Koogle 

Timothy Koogle was first CEO and President of web company Yahoo! between 1995 and 2001. He served as the company's chairman from 1999-2003. He was named to the Top 25 Executives of the Year by BusinessWeek in 1999 and 2000.
Prior to working for Yahoo! Koogle worked for Intermec and Motorola.
He obtained a B.S. degree from the University of Virginia in mechanical engineering, an M.S. degree from Stanford University in engineering and a Ph.D from Stanford University in engineering



 #8 Tomeo Kanbayashi
NTT Data
1995-1999
Japan
Information Technology
Insider CEO
MBA: No
Country-Adjusted TSR: 658%
Industry-Adjusted TSR: 436%

#7 John W. Thompson      
John W. Thompson (born April 24, 1949) is a former vice-president at IBM and the former Chief Executive Officer (CEO) of Symantec Corporation. He is presently the CEO of Virtual Instruments. During his tenure as CEO of Symantec, he was the only African American leading a major technology company.
Born in Fort Dix, New Jersey, Thompson attended John F. Kennedy High School in Riviera Beach, Florida (now Suncoast Community High School). He received a Bachelor of Business Administration from Florida A&M in 1971 and a Master's degree in Management (M.B.A.) from the Sloan Fellows program of the MIT Sloan School of Management in 1983.

#6 Eric E. Schmidt
Eric Emerson Schmidt (born April 27, 1955) is an American software engineer, businessman, and the executive chairman of Google. In 2013, Forbes ranked Schmidt as the 138th-richest person in the world, with an estimated wealth of $8.3 billion.
As an intern at Bell Labs, Schmidt did a complete re-write of the Lex analysis software program for the Unix computer operating system. From 1997 to 2001, he was chief executive officer of Novell. From 2001 to 2011, he served as the CEO of Google. He served on various other boards in academia and industry, such as the boards of trustees for both Carnegie Mellon University and Princeton University.
Eric Emerson Schmidt was born in Washington, D.C.; some sources state Falls Church, Virginia. He was one of three sons of Eleanor, who had a master's degree in psychology, and Wilson Schmidt, a German-American professor of international economics at the Johns Hopkins University, who worked at the U.S. Treasury Department during the Nixon Administration. He grew up in Blacksburg, Virginia, and Falls Church, Virginia.
Schmidt graduated from Yorktown High School in Arlington, Virginia, in 1972, after earning eight varsity letter awards in long-distance running.[12][13] He then attended Princeton University, where he started as an architecture major but then switched and earned a B.S. degree in electrical engineering in 1976. From 1976 to 1980, Schmidt stayed at the International House Berkeley, where he met his future wife, Wendy Boyle. In 1979, at the University of California, Berkeley, Schmidt then earned an M.S. degree for designing and implementing a network linking the campus computer center with the CS and EECS departments. There, he also earned a Ph.D. degree in 1982 in EECS, with a dissertation about the problems of managing distributed software development and tools for solving these problems. He was joint author during his summers at Bell Labs of Lex (a software lexical analyzer and an important tool for compiler construction). He taught at the Stanford Graduate School of Business in the 2000s as a lecturer in strategic management.
In June 1980, Schmidt married Wendy Susan Boyle (born in Short Hills, New Jersey, in 1957). They lived in Atherton, California, in the 1990s. They have two daughters, Sophie and Allison. The two separated in 2011 That year, Schmidt dated Lisa Shields, a communications executive for the Council on Foreign Relations.
In 2012, he was dating concert pianist and artist Chau-Giang Nguyen, who was formerly engaged to Hollywood Oscar-winning TV and movie producer Brian Grazer until they split in 2011.



#5 John T. Chambers


John T. Chambers (born August 23, 1949) is Chairman of the Board and CEO of Cisco Systems, Inc.
Chambers was born on August 23, 1949 in Cleveland, Ohio to John Tuner "Jack" and June Chambers. His mother was a psychiatrist and his father was an obstetrician. The family resided in Kanawha City,West Virginia.
When Chambers was nine years old, he was diagnosed with dyslexia. Aided by a therapist, Chambers learned to cope with his disability.He holds a bachelor of science / bachelor of arts degree in business and a law degree from West Virginia University and a master of business administration degree in finance and management from Indiana University. Previously, he also attended the School of Engineering at Duke University from 1967 to 1968.After obtaining his MBA, Chambers began his career in technology sales at IBM. After six years, he moved to Wang Laboratories. There, he became the Vice President of U.S. Operations in 1987. He then left Wang in 1991 and joined Cisco


 #4 Margaret C. Whitman


Margaret Cushing "Meg" Whitman (born August 4, 1956) is an American business executive. She is the president and chief executive officer of Hewlett-Packard. A native of Long Island, New York, she is a graduate of Princeton University and Harvard Business School. Whitman served as an executive in The Walt Disney Company where she was vice president of strategic planning throughout the 1980s. In the 1990s, she served as an executive for DreamWorks, Procter & Gamble, and Hasbro. Whitman served as president and chief executive officer of eBay from 1998 to 2008. During her 10 years with the company, she oversaw its expansion from 30 employees and $4 million in annual revenue to more than 15,000 employees and $8 billion in annual revenue.
In 2008, she was cited by The New York Times as among the women most likely to become the first female President of the United States. In February 2009, Whitman announced her candidacy for Governor of California, becoming the third woman in a 20-year period to run for the office. She won the Republican primary in June 2010. The fourth wealthiest woman in the state of California with a net worth of $1.3 billion in 2010, she spent more of her own money on the race than any other political candidate spent on a single election in American history,spending $144 million total of her own fortune and $178.5 million including donors. Whitman lost to Jerry Brown in the November 2 election.
#3 Yun Jong-Yong
Jong-Yong Yun served as a Company Adviser of Samsung Electronics Co. Ltd. since May 2008. Mr. Yun served as Chief Executive Officer of Samsung Electronics Co., Ltd. until May 2008. Mr. Yun served as President and Chief Executive Officer of Samsung Electronics Co., Ltd., since 1996 and Co-Chief Executive Officer since 2000 and served as President and Chief Executive Officer of Samsung Japan Headquarters since 1995. He served as President and Chief Executive Officer of Samsung Display Devices Co., Ltd., since 1993; President and Chief Executive Officer of Samsung Electro-Mechanics Co., Ltd., since 1992; President and Representative Director of Consumer Electronics Business Group since 1991; Vice President Representative Director, Consumer of Electronics Business Group since 1990 and Vice President of Electronics Group since 1988. Mr. Yun served as Chief Executive Officer, Vice Chairman and Director of Samsung C&T Corporation (formerly Samsung Corp.). He entered The Samsung Group in 1966. Since November 1981 he served as Head of The Video Business Division. Mr. Yun serves as Chairman of The National Academy of Engineers. He served as Vice Chairman of Samsung Electronics Co., Ltd. from 2000 to May 2008 and of it's Director until May 14, 2008. Mr. Yun received Asia's Businessman of the Year (Fortune), in 2000, The Top 25 Managers of the Year (Business Week), in 1999, The Prize for The Most Successful Chief Executive Officer in Korea (Korea Management Association), in 1998, Outstanding Achievement in Management (IIE), in 1995, The Prize for The Honorable Engineering Alumnus Graduated from Seoul National University, in 1992, Gold Medal for Contribution to Industry by the Government, in 1990, Bronze Medal for Contribution to Industry by the Government. Mr. Yun completed Graduation from MIT Sloan School Senior Executive Course in1988, B.A. in Electronics and Graduated from Seoul National University in 1966
#2 Jeffrey P. Bezos 
Jeffrey P. Bezos was born in Albuquerque, New Mexico. His mother was still in her teens, and her marriage to his father lasted little more than a year. She remarried when Jeffrey was four. Jeffrey's stepfather, Mike Bezos, was born in Cuba; he escaped to the United States alone at age 15, and worked his way through the University of Albuquerque. When he married Jeffrey's mother, the family moved to Houston, where Mike Bezos became an engineer for Exxon. Jeffrey's maternal ancestors were early settlers in Texas, and over the generations had acquired a 25,000-acre ranch at Cotulla. Jeffrey's grandfather was a regional director of the Atomic Energy Commission in Albuquerque. He retired early to the family ranch, where Jeffrey spent most of the summers of his youth, working with his grandfather at the enormously varied tasks essential to the operationFrom an early age, Jeffrey displayed a striking mechanical aptitude. Even as a toddler, he asserted himself by dismantling his crib with a screwdriver. He also developed intense and varied scientific interests, rigging an electric alarm to keep his younger siblings out of his room and converting his parents' garage into a laboratory for his science projects. When he was a teenager, the family moved to Miami, Florida. In high school in Miami, Jeffrey first fell in love with computers. An outstanding student, he was valedictorian of his class. He entered Princeton University planning to study physics, but soon returned to his love of computers, and graduated with a degree in computer science and electrical engineering.
After graduation, Jeff Bezos found employment on Wall Street, where computer science was increasingly in demand to study market trends. His went to work at Fitel, a start-up company that was building a network to conduct international trade. He stayed in the finance realm with Bankers Trust, rising to a vice presidency. At D. E. Shaw, a firm specializing in the application of computer science to the stock market, Bezos was hired as much for his overall talent as for any particular assignment. While working at Shaw, Jeff met his wife, Mackenzie, also a Princeton graduate. He rose quickly at Shaw, becoming a senior vice president, and looked forward to a bright career in finance, when he made a discovery that changed his life -- and the course of business history.
The Internet was originally created by the Defense Department to keep its computer networks connected during an emergency, such as natural catastrophe or enemy attack. Over the years, it was adopted by government and academic researchers to exchange data and messages, but as late as 1994, there was still no Internet commerce to speak of. One day that spring, Jeffrey Bezos observed that Internet usage was increasing by 2,300 percent a year. He saw an opportunity for a new sphere of business, and immediately began considering the possibilities. 
#1 Steve Jobs 
Steven Paul "Steve" Jobs ( February 24, 1955 – October 5, 2011) was an American entrepreneur, marketer, and inventor, who was the co-founder (along with Steve Wozniak and Ronald Wayne), chairman, and CEO of Apple Inc. Through Apple, he is widely recognized as a charismatic pioneer of the personal computer revolution and for his influential career in the computer and consumer electronics fields, transforming "one industry after another, from computers and smartphones to music and movies" Jobs also co-founded and served as chief executive of Pixar Animation Studios; he became a member of the board of directors of The Walt Disney Company in 2006, when Disney acquired Pixar. Jobs was among the first to see the commercial potential of Xerox PARC's mouse-driven graphical user interface, which led to the creation of the Apple Lisa and, one year later, the Macintosh. He also played a role in introducing the LaserWriter, one of the first widely available laser printers, to the market.
After a power struggle with the board of directors in 1985, Jobs left Apple and founded NeXT, a computer platform development company specializing in the higher-education and business markets. In 1986, he acquired the computer graphics division of Lucasfilm, which was spun off as Pixar. He was credited in Toy Story (1995) as an executive producer. He served as CEO and majority shareholder until Disney's purchase of Pixar in 2006. In 1996, after Apple had failed to deliver its operating system, Copland, Gil Amelio turned to NeXT Computer, and the NeXTSTEP platform became the foundation for the Mac OS X. Jobs returned to Apple as an advisor, and took control of the company as an interim CEO. Jobs brought Apple from near bankruptcy to profitability by 1998.
As the new CEO of the company, Jobs oversaw the development of the iMac, iTunes, iPod, iPhone, and iPad, and on the services side, the company's Apple Retail Stores, iTunes Store and the App Store. The success of these products and services provided several years of stable financial returns, and propelled Apple to become the world's most valuable publicly traded company in 2011. The reinvigoration of the company is regarded by many commentators as one of the greatest turnarounds in business history.
In 2003, Jobs was diagnosed with a pancreas neuroendocrine tumor. Though it was initially treated, he reported a hormone imbalance, underwent a liver transplant in 2009, and appeared progressively thinner as his health declined. On medical leave for most of 2011, Jobs resigned in August that year, and was elected Chairman of the Board. He died of respiratory arrest related to his tumor on October 5, 2011.
Jobs received a number of honors and public recognition for his influence in the technology and music industries. He has been referred to as "legendary", a "futurist" or simply "visionary" and has been described as the "Father of the Digital Revolution" a "master of innovation", "the master evangelist of the digital age and a "design perfectionist"

 






                                                

how Eclipse IDE works..Eclipse IDE for dummies(pdf)

click here to download this book(pdf)

An Integrated Development Environment:
  An integrated development environment (IDE) is an all-in-one tool for writing,
   editing, compiling, and running computer programs. And Eclipse is an
   excellent integrated development environment. In a sense, that’s all ye need
   to know.
Of course, what you absolutely need to know and what’s good for you to
know may be two different things. You can learn all kinds of things about Java
and Eclipse, and still benefit by learning more. So with that in mind, I’ve put
together this chapter full of facts. I call it my “useful things to know about
Eclipse” (my “uttkaE”) chapter.

The Grand Scheme of Things in Eclipse:
The Eclipse Foundation divides its work into projects and subprojects. The
projects you may hear about the most are the Eclipse project, the Eclipse
Tools project, and the Eclipse Technology project.
Sure, these project names can be confusing. The “Eclipse project” is only one
part of the Eclipse Foundation’s work, and the “Eclipse project” is different
from the “Eclipse Tools project.” But bear with me. This section gives you
some background on all these different projects.
And why would you ever want to know about the Eclipse Foundation’s projects?
Why should I bother you with details about the Foundation’s administrative
organization? Well, when you read about the Foundation’s projects, you get a
sense of the way the Eclipse software is organized. You have a better understanding
of where you are and what you’re doing when you use Eclipse.

 


Friday, 6 December 2013

Encyclopedia of Networking..by Werner Feibel(pdf)

             click here to download this book........



What You’ll Find in This Book::

As in the first edition, I’ve tried to make this Encyclopedia a comprehensive source of information
about matters relating to networking. I’ve also tried to present the information in a clear
and useful manner.
This book contains comprehensive, straightforward summaries of the major concepts,
issues, and approaches related to networking. Networking is defined broadly to encompass
configurations ranging from a couple of connected computers just a few feet apart to a network
of several thousand machines (of all types and sizes) scattered around the world. You’ll find
discussions of networking as it’s done by servers and clients, managers and agents, peers, and
even over the telephone.
You probably won’t find anything here that you can’t find in other places. However, I don’t
know of any other book or source that collects so much network-related information in one
place. To find all the information summarized here, you would need to check hundreds of
books, disks, articles, Web pages, or other documents.
Despite its hefty size, this encyclopedia just scratches the surface of what there is to know
about networking. After all, how complete can any book be if just the World Wide Web on the
Internet has over 10 million hypertext documents. I do think, however, that this book scratches
deeper than most other references you’ll find.
This revised edition updates entries for concepts and technologies that change rapidly or
where there have been major developments. I’ve also added considerable material about the
Internet (and especially about the World Wide Web), since interest in this networking phenomenon
is growing at an astounding pace.

Thursday, 5 December 2013

JAVA network programming by O"REILLY

            
click here to download this book...........



Java™'s growth over the last five years has been nothing short of phenomenal. Given
Java's rapid rise to prominence and the general interest in networking, it's a little
surprising that network programming in Java is still so mysterious to so many. This
doesn't have to be. In fact, writing network programs in Java is quite simple, as this
book will show. Readers with previous experience in network programming in a Unix,
Windows, or Macintosh environment should be pleasantly surprised at how much
easier it is to write equivalent programs in Java. That's because the Java core API
includes well-designed interfaces to most network features. Indeed, there is very little
application layer network software you can write in C or C++ that you can't write
more easily in Java. Java Network Programming endeavors to show you how to take
advantage of Java's network class library to quickly and easily write programs that
accomplish many common networking tasks. These include:
• Browsing pages on the Web
• Parsing and rendering HTML
• Sending email with SMTP
• Receiving email with POP and IMAP
• Writing multithreaded servers
• Installing new protocol and content handlers into browsers
• Encrypting communications for confidentiality, authentication, and guaranteed
message integrity
• Designing GUI clients for network services
• Posting data to CGI programs
• Looking up hosts using DNS
• Downloading files with anonymous FTP
• Connecting sockets for low-level network communication
• Distributing applications across multiple systems with Remote Method
Invocation
Java is the first language to provide such a powerful cross-platform network library
that handles all these diverse tasks. Java Network Programming exposes the power
and sophistication of this library. This book's goal is to enable you to start using Java
as a platform for serious network programming. To do so, this book provides a
general background in network fundamentals as well as detailed discussions of Java's
facilities for writing network programs. You'll learn how to write Java applets and
applications that share data across the Internet for games, collaboration, software
updates, file transfer and more. You'll also get a behind-the-scenes look at HTTP, CGI,
TCP/IP, and the other protocols that support the Internet and the Web. When you
finish this book, you'll have the knowledge and the tools to create the next generation
of software that takes full advantage of the Internet.
About the Second Edition
In the first chapter of the first edition of this book, I wrote extensively about the sort
of dynamic, distributed network applications I thought Java would make possible.
One of the most exciting parts of writing this second edition was seeing that virtually
all of the applications I had postulated have indeed come to pass. Programmers are
using Java to query database servers, monitor web pages, control telescopes, manage
multiplayer games, and more, all by using Java's ability to access the Internet. Java in
general, and network programming in Java in particular, has moved well beyond the
hype stage and into the realm of real, working applications. Not all network software
is written in Java yet, but it's not for a lack of trying. Efforts are well under way to
subvert the existing infrastructure of C-based network clients and servers with pure
Java replacements. It's unlikely that Java will replace C for all network programming
in the near future. However, the mere fact that many people are willing to use web
browsers, web servers, and more written in Java shows just how far we've come since
1996.
This book has come a long way too. The second edition has been rewritten almost
from scratch. There are five completely new chapters, some of which reflect new
APIs and abilities of Java introduced since the first edition was published (Chapter 8,
Chapter 12, and Chapter 19 ), and some of which reflect my greater experience in
teaching this material and noticing exactly where students' trouble spots are (Chapter
4, and Chapter 5). In addition, one chapter on the Java Servlet API has been removed,
since the topic really deserves a book of its own; and indeed Jason Hunter has written
that book, Java Servlet Programming (O'Reilly & Associates, Inc., 1998).
However, much more important than the added and deleted chapters are the changes
inside the chapters that we kept. The most obvious change to the first edition is that all
of the examples have been rewritten with the Java 1.1 I/O API. The deprecation
messages that tormented readers who compiled the first edition's examples using Java
1.1 or later are now a thing of the past. Less obviously, but far more importantly, all
the examples have been rewritten from the ground up to use clean, object-oriented
design that follows Java's naming conventions and design principles. Like almost
everyone (Sun not excepted), I was still struggling to figure out a lot of the details of
just what one did with Java and how one did it when I wrote the first edition in 1996.
The old examples got the network code correct, but in most other respects they now
look embarrassingly amateurish. I've learned a lot about both Java and object-oriented
programming since then, and I think my increased experience shows in this edition.
For just one example, I no longer use standalone applets where a simple frame-based
application would suffice. I hope that the new examples will serve as models not just
of how to write network programs, but also of how to write Java code in general.
And of course the text has been cleaned up too. In fact, I took as long to write this
second, revised edition as I did to write the original edition. As previously mentioned,

Wednesday, 4 December 2013

Learning Perl Programmimg Language is quite a bit easy so Pearl is becoming fastest growing computer language.

CLICK HERE TO DOWNLOAD THIS BOOK(PDF)...

What is Perl?:

Perl, sometimes referred to as Practical Extraction and Reporting Language, is an interpreted programming language with a huge number of uses, libraries and resources. Arguably one of the most discussed and used languages on the internet, it is often referred to as the swiss army knife, or duct tape, of the web.
Perl was first brought into being by Larry Wall circa 1987 as a general purpose Unix scripting language to make his programming work simpler. Although it has far surpassed his original creation, Larry Wall still oversees development of the core language, and the newest version, Perl 6.

Where can I get it?:

Many web hosts and Unix / Linux machines already have Perl installed and running, so check with your host or system administrator first. If you're installing on a local machine, go to the Perl web site, click on the 'Downloads' link, and find the version for your operating system. There are binary packages available, or you may install it from the source code.

How can I tell if it's installed?:

Get to a command prompt on your system and type the command perl -v. If Perl is installed correctly, you should see the version information displayed.


HOw to retrieve hard drive data ..here is beginer guide.

click here to download this book..........

about data forensics

Data forensics is a branch of digital forensic science. This pertains to legal evidence found in computers and digital storage media. The goal of data forensics is to examine digital media in a forensically sound manner with the aim of recovering, linking and understanding information. It is most often associated with the investigation of a wide variety of computer crime. However, computer evidence may also be used in civil proceedings. The discipline involves similar techniques and principles to data recovery, but with additional guidelines and practices designed to create a legal audit trail.
Data forensics has become a vital tool in providing evidence in cases such as computer misuse and attacks against computer systems. It is also used to trace lines of communication in traditional claims. This includes the forensic analysis and reporting of all digital media, regardless of the physical condition of the media, format or operating system. Forensic computing examinations by the computer expert should be in an understandable computer forensic analysis report. At the end of the thorough investigation, a report will be produced which will detail all findings. The computer forensics report will be simple to understand.

who we help

Using computer forensic experts, such as those at Data Forensics gives you confidence that the job in hand is being undertaken expertly. We always follow ACPO, (Association of Chief Police Officers) guidelines. All our computer forensic analysts are fully qualified to degree level and beyond. We are able to find deleted items, hidden files, password protected files and more. Computer Forensics can help Internal Audit, IT Service Desk, HR, Legal Services and Information Security. However, we also provide computer forensic analysis for smaller organisations and even home users, to determine what actions were performed by who and when
click here to download another book  (pdf).....

Friday, 29 November 2013

Java for programmers (second edition) by Paul Deitel and Harvey Deitel(pdf)

click here to download this book.....

What Is Java?

Java is a computer programming language. It enables programmers to write computer instructions using English based commands, instead of having to write in numeric codes. It’s known as a “high-level” language because it can be read and written easily by humans. Like English, Java has a set of rules that determine how the instructions are written. These rules are known as its “syntax”. Once a program has been written, the high-level instructions are translated into numeric codes that computers can understand and execute.

Who Created Java?

In the early nineties, Java was created by a team led by James Gosling for Sun Microsystems. It was originally designed for use on digital mobile devices, such as cell phones. However, when Java 1.0 was released to the public in 1996, its main focus had shifted to use on the Internet. It provided more interactivity with users by giving developers a way to produce animated webpages . Over the years it has evolved as a successful language for use both on and off the Internet. A decade later, it’s still an extremely popular language with over 6.5million developers worldwide.

Why Choose Java?

Java was designed with a few key principles in mind:
  • Easy to Use: The fundamentals of Java came from a programming language called c++. Although c++ is a powerful language, it was felt to be too complex in its syntax, and inadequate for all of Java's requirements. Java built on, and improved the ideas of c++, to provide a programming language that was powerful and simple to use.
  • Reliability: Java needed to reduce the likelihood of fatal errors from programmer mistakes. With this in mind, object-oriented programming was introduced. Once data and its manipulation were packaged together in one place, it increased Java’s robustness.
  • Secure: As Java was originally targeting mobile devices that would be exchanging data over networks, it was built to include a high level of security. Java is probably the most secure programming language to date.
  • Platform Independent: Programs needed to work regardless of the machine they were being executed on. Java was written to be a portable language that doesn't care about the operating system or the hardware of the computer.
The team at Sun Microsystems were successful in combining these key principles, and Java's popularity can be traced to it being a robust, secure, easy to use, and portable language.




Thursday, 28 November 2013

C++ GUI Programming with Qt 3 by Jasmin Blanchette

click here to download......





Why Qt? Why do programmers like us choose Qt? Sure, there are the obvious
answers: Qt’s single-source compatibility, its feature richness, its C++ performance,
the availability of the source code, its documentation, the high-quality
technical support,and all the other items mentioned in Trolltech’s glossy marketing
materials. This is all very well, but it misses the most important point:
Qt is successful because programmers like it.
How come programmers like one technology, but dislike another? Personally,
I believe software engineers enjoy technology that feels right, but dislike everything
that doesn’t. How else can we explain that some of the brightest programmers
need help to program a VCR, or that most engineers seem to have
trouble operating the company’s phone system? I for one am perfectly capable
of memorizing sequences of random numbers and commands, but if these
are required to control my answering machine, I’d prefer not to have one. At
Trolltech, our phone system forces us to hold the ‘∗’ key pressed down for two
seconds before we are allowed to type in the other person’s extension number.
If you forget to do this but start typing the extension immediately, you have
to dial the entire number again. Why ‘∗’? Why not ‘#’, or ‘1’, or ‘5’, or any of
the other twenty keys on the phone? Why two seconds and not one, or three,
or one and a half? Why anything at all? I find the phone so irritating that I
avoid using it whenever I can. Nobody likes having to do random things, especially
when those random things apparently depend on some equally random
context you wish you didn’t have to know about in the first place.
Programming can be a lot like using our phone system, only worse. And this
is where Qt comes to the rescue. Qt is different. For one thing,Qt makessense.
And for another, Qt is fun. Qt lets you concentrate on your tasks. When Qt’s
original architects faced a problem, they didn’t just look for a good solution, or
a quick solution, or the simplest solution. They looked for the right solution,
and then they documented it. Granted they made mistakes,and granted some
of their design decisions didn’t pass the test of time, but they still got a lot of
things right, and what wasn’t right could and can be corrected. You can see
this by the fact that a system originally designed to bridge Windows 95 and
Unix/Motif now unifies modern desktop systems as diverse as Windows XP,
Mac OS X, and GNU/Linux with KDE.
Long before Qt became so popular and so widely used, the dedication of Qt’s
developers to finding the right solutions made Qt special. That dedication is
just as strong today and affects everyone who maintains and develops Qt. For
us, working on Qt is a responsibility and a privilege. We are proud of helping
to make your professional and open source lives easier and more enjoyable.

Wednesday, 27 November 2013

HOW to face programming challenges ..here is stuff ...by stevan s skiena and miguel a.revilla.....

click here to download....................
This book has been designed to serve as a textbook for three types of courses:
• Algorithm courses focusing on programming.
• Programming courses focusing on algorithms.
• Elective courses designed to train students to participate in competitions such
as the Association for Computing Machinery (ACM) International Collegiate
Programming Contest and the International Olympiad in Informatics.
Such courses can be a lot of fun for all involved. Students are easily motivated by
the thrill of competition, and get positive feedback each time the judge accepts their
solution. The most obvious algorithm may result in a “Time Limit Exceeded” message
from the judge, thus motivating a search for efficiency. The correct insight can make for
a dozen-line program instead of a huge mass of code. The best students will be inspired
to try extra problems just for kicks.
Such courses are fun to teach, too. Many problems are quite clever, putting a fresh
face on standard topics in programming and algorithms. Finding the best solution
requires insight and inspiration. It is exciting to figure out the right way to do each of
the problems, and even more exciting when the students figure it out for themselves.
Pedagogical features of this book include:
different goals in mind:
• Pascal — The most popular educational programming language of the 1980s,
Pascal was designed to encourage good structured-programming habits. Its popularity
has eroded almost to the point of extinction, but it retains a foothold in
high schools and in Eastern Europe.
• C — The original language of the UNIX operating system, C was designed to
provide experienced programmers with the power to do whatever needs to be
done. This includes the power to hang yourself by invalid pointer references and
invalid type casting. Developments in object-oriented programming during the
1990s lead to the new and improved. . .
• C++ — The first commercially successful object-oriented language pulled off
the neat trick of maintaining backward compatibility with C while incorporating
new data abstraction and inheritance mechanisms. C++ became the primary
programming language for teaching and industry during the mid-to-late 1990s,
but now it looks over its shoulder at. . .
• Java — Designed as a language to support mobile programs, Java has special
security mechanisms to avoid common programmer errors such as array out-ofbounds
violations and illegal pointer access. It is a full-featured programming
language which can do everything the others can and more.

OPERATING SYSTEM by William Stallings.....

click here to download this book............
   
An operating system mediates among application programs, utilities, and users, on
the one hand, and the computer system hardware on the other. To appreciate the
functionality of the operating system and the design issues involved, one must have
some appreciation for computer organization and architecture. Chapter 1 provides
a brief survey of the processor, memory, and Input/Output (I/O) elements of a computer system.

Not all computers have operating systems. The computer that controls the microwave oven in your kitchen, for example, doesn't need an operating system. It has one set of tasks to perform, very straightforward input to expect (a numbered keypad and a few pre-set buttons) and simple, never-changing hardware to control. For a computer like this, an operating system would be unnecessary baggage, driving up the development and manufacturing costs significantly and adding complexity where none is required. Instead, the computer in a microwave oven simply runs a single hard-wired program all the time.
For other devices, an operating system creates the ability to:
  • serve a variety of purposes
  • interact with users in more complicated ways
  • keep up with needs that change over time
All desktop computers have operating systems. The most common are the Windows family of operating systems developed by Microsoft, the Macintosh operating systems developed by Apple and the UNIX family of operating systems (which have been developed by a whole history of individuals, corporations and collaborators). There are hundreds of other operating systems available for special-purpose applications, including specializations for mainframes, robotics, manufacturing, real-time control systems and so on.
In any device that has an operating system, there's usually a way to make changes to how the device works. This is far from a happy accident; one of the reasons operating systems are made out of portable code rather than permanent physical circuits is so that they can be changed or modified without having to scrap the whole device.
For a desktop computer user, this means you can add a new security update, system patch, new application or even an entirely new operating system rather than junk your computer and start again with a new one when you need to make a change. As long as you understand how an operating system works and how to get at it, in many cases you can change some of the ways it behaves. The same thing goes for your phone, too.





Tuesday, 26 November 2013

LINUX KERNEL Development byRobert Love...(pdf) a thorough guide to design and implementation of the linux kernel

                                                Click here to download this book.................

What is the Kernel?

A kernel is the lowest level of easily replaceable software that interfaces with the hardware in your computer. It is responsible for interfacing all of your applications that are running in “user mode” down to the physical hardware, and allowing processes, known as servers, to get information from each other using inter-process communication (IPC).

Different Types of Kernels

There are, of course, different ways to build a kernel and architectural considerations when building one from scratch. In general, most kernels fall into one of three types: monolithic, microkernel, and hybrid. Linux is a monolithic kernel while OS X (XNU) and Windows 7 use hybrid kernels. Let’s take a quick tour of the three categories so we can go into more detail later.
Microkernel
A microkernel takes the approach of only managing what it has to: CPU, memory, and IPC. Pretty much everything else in a computer can be seen as an accessory and can be handled in user mode. Microkernels have a advantage of portability because they don’t have to worry if you change your video card or even your operating system so long as the operating system still tries to access the hardware in the same way. Microkernels also have a very small footprint, for both memory and install space, and they tend to be more secure because only specific processes run in user mode which doesn’t have the high permissions as supervisor mode.
Pros
  • Portability
  • Small install footprint
  • Small memory footprint
  • Security
Cons
  • Hardware is more abstracted through drivers
  • Hardware may react slower because drivers are in user mode
  • Processes have to wait in a queue to get information
  • Processes can’t get access to other processes without waiting
Monolithic Kernel
Monolithic kernels are the opposite of microkernels because they encompass not only the CPU, memory, and IPC, but they also include things like device drivers, file system management, and system server calls. Monolithic kernels tend to be better at accessing hardware and multitasking because if a program needs to get information from memory or another process running it has a more direct line to access it and doesn’t have to wait in a queue to get things done. This however can cause problems because the more things that run in supervisor mode, the more things that can bring down your system if one doesn’t behave properly.
Pros
  • More direct access to hardware for programs
  • Easier for processes to communicate between eachother
  • If your device is supported, it should work with no additional installations
  • Processes react faster because there isn’t a queue for processor time
Cons
  • Large install footprint
  • Large memory footprint
  • Less secure because everything runs in supervisor mode.



Cracking Coding Interview by gayle lakkmann (pdf) .Founder and CEO CareerCup.com

           click here to dowload this book.......
 how to face coding interview is not a cup of tip.here is few tips which can help you .........

The first thing to know about a programming or tech job interview is that you're likely to be interviewed by other programmers--the people you will work with. Although you'll likely make a quick pass through Human Resources to give over your background, the final decision will often be made by your future (or not so future) coworkers.

This gives you a great opportunity to evaluate the company--do you want to work with these people? Do they seem to know what they're doing? Can you get along with them--can you learn from them? They're working on the newest projects, so you can actually ask them about the work and the working conditions.

One advantage of looking at the interview as both a chance to be evaluated and to evaluate is that you can maintain a good balance of power in the room. You don't need to feel as though you're the one who's under all of the pressure. The company, too, needs to impress you enough for you to want to work there. Don't let this become cockiness, but you don't need to let the interviewer run you over and leave you hanging out to dry. If he's a jerk, you don't want to work there anyway, right?

Presentation

The more quickly you can establish a rapport with your interviewer, the better. Always be sure to respect the interviewer, but don't be afraid of being yourself. If they don't like your manner, you probably don't want to work for them. At the same time, there are standards that you are expected to maintain during an interview--don't talk about your last drunken adventure, medical ailments, or the like.

Dress based on how you are expected to dress. If the company tells you that they don't care if you wear a suit or not, then you probably can take it at face value. If they don't make it clear that they don't mind what you wear, better to play it safe and risk overdressing with a suit than to risk underdressing. If nothing else, you don't want what you wear to distract you during the interview. You don't want to be wondering, "do I look all right?" Just take care of it in advance and don't sweat it.

Your Resume

Be prepared for your resume to be a point of discussion. You can practice explaining the different portions of your resume in advance, but don't script things too much. An interview should flow somewhat loosely and you don't want to end up embarassing yourself by repeating information that you already told the interviewer in reply to another question.

The Interview Questions

Aside from the general background questions based on your resume, you're likely to be asked some more technical or brain-teaser type questions.

Brain Teasers

Brain teasers are probably the most intimidating type of interview question. There's a sense in which your ability to answer some dumb riddle is associated with your IQ. It's also tricky to prepare for a brain teaser because there are no set-in-stone techniques you can apply.

Nevertheless, it helps to be prepared for them. There are a couple of types of brain teasers: the ah-ha question, the deductive reasoning problem, and the more open-ended questions.

Generally, a good strategy is to show your problem solving skills. Even if you don't get the answer, you can salvage the situation by showing that you understand how to approach a problem.
  • State your assumptions
  • Ask intelligent questions
  • Talk out loud, show your thought process
  • Draw pictures or diagrams
We'll look at each of these techniques later in the article in the categories to which they apply.