This is default featured post 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Thursday, December 4, 2008

Professional SQL Server 2000 Database Design

About the Author
Louis is an avowed database nut. Currently he is toiling as the database architect for Education Networks
of America in Nashville, Tennessee, not to mention writing this book and hopefully one more.

Microsoft Windows XP Registry Guide

Chapter 1: Learning the Basics
Overview
The registry has a subtle but important role in Microsoft Windows XP. On one hand, the registry is
passive—it's just a big collection of settings sitting on your hard disk, and you probably don't think
much about it while you're editing a document, browsing the Internet, or searching for a file. On the
other hand, it plays a key role in all those activities. The settings in the registry determine how
Windows XP appears and how it behaves. They even control applications running on your
computer. This gives the registry great potential as a tool for power users or IT professionals,
enabling them to customize settings that aren't available in the user interface.
This chapter introduces the registry to you. First you learn about the registry's role and how it fits
into your world. Then I explain some important terminology to ensure that we're speaking the same
language, and you see how Windows XP organizes the registry. Next you learn about the tools I
use to edit the registry. And last, you see how Windows XP stores the registry on the hard disk.
Throughout this chapter, you'll find several tidbits that are useful beyond the registry. For example,
you learn about the two different architectures for storing numbers in memory, which IT
professionals run into as much outside the registry as inside.
This is all basic information, but don't skip this chapter. Read it once, and you'll be set for the rest of
this book

Maya Professional Tips and Techniques


Maya
®
Professional Tips
and Techniques.
Acknowledgments
My thanks go to the excellent editorial and production staff at Wiley, including my
acquisitions editor, Mariann Barsolo; my production editor, Martine Dardignac; and
my technical editor, Keith Reicher.
Special thanks to this book’s special contributors: Michael Stolworthy, Matt Orlich,
James Chandler, Kirk Buckendorf, Rocky Bright Jr., Joshua Perez, and Tim Kelly.
Special thanks to all the animators who have toiled before me and along with me.
3D animation is a wonderful, inspiring medium, particularly when so many pour their
passion into the work.
Special thanks to my family and friends who supported my wild ambitions. And
the biggest thanks go to my beautiful wife, Anita, who encouraged me all the way
despite all those late, late 3D nights.
I’d like to point out that several of the photos in this book were provided by the
photographers of Stock Xchng (www.sxc.hu). This is a wonderful site that provides
royalty-free, restriction-free material simply out of love of the medium. Additional
models were purchased from Turbo Squid (www.turbosquid.com), another excellent
service.
Customization and
MEL Scripting
MAYA TAKES THE lion’s share of high-end 3D work in
the feature film and visual effects industry. You can
trace this fact to one particular trait: the software
is infinitely customizable. The customization is not
restricted to multimillion-dollar productions, however.
You can customize Maya to your own tastes and
thereby work faster, more intelligently, and most
important, more comfortably. The most thorough and
powerful method of customization is the application
of MEL scripting. MEL is the underlying language on
which the entire program is built. Every single tool
and function within Maya has one or more lines of
MEL code associated with it

Thursday, November 20, 2008

Practical Web 2.0 Applications with PHP


Practical Web 2.0
Applications with PHP
Practical Web 2.0 Applications with PHP
Copyright © 2008 by Quentin Zervaas
All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means,
electronic or mechanical, including photocopying, recording, or by any information storage or retrieval
system, without the prior written permission of the copyright owner and the publisher.
ISBN-13 (pbk): 978-1-59059-906-8
ISBN-10 (pbk): 1-59059-906-3
ISBN-13 (electronic): 978-1-4302-0474-9
ISBN-10 (electronic): 1-4302-0474-5
Printed and bound in the United States of America 9 8 7 6 5 4 3 2 1
Trademarked names may appear in this book. Rather than use a trademark symbol with every occurrence
of a trademarked name, we use the names only in an editorial fashion and to the benefit of the trademark
owner, with no intention of infringement of the trademark.
Lead Editor: Ben Renow-Clarke
Technical Reviewer: Jeff Sambells
Editorial Board: Steve Anglin, Ewan Buckingham, Tony Campbell, Gary Cornell, Jonathan Gennick,
Jason Gilmore, Kevin Goff, Jonathan Hassell, Matthew Moodie, Joseph Ottinger, Jeffrey Pepper,
Ben Renow-Clarke, Dominic Shakeshaft, Matt Wade, Tom Welsh
Project Manager: Richard Dal Porto
Copy Editors: Andy Carroll, Kim Wimpsett
Assistant Production Director: Kari Brooks-Copony
Production Editor: Liz Berry
Compositor: Diana Van Winkle
Proofreader: Lisa Hamilton
Indexer: Broccoli Information Management
Artist: Diana Van Winkle
Cover Designer: Kurt Krames
Manufacturing Director: Tom Debolski
Distributed to the book trade worldwide by Springer-Verlag New York, Inc., 233 Spring Street, 6th Floor,
New York, NY 10013. Phone 1-800-SPRINGER, fax 201-348-4505, e-mail orders-ny@springer-sbm.com, or
visit http://www.springeronline.com.
For information on translations, please contact Apress directly at 2855 Telegraph Avenue, Suite 600,
Berkeley, CA 94705. Phone 510-549-5930, fax 510-549-5939, e-mail info@apress.com, or visit
http://www.apress.com.
The information in this book is distributed on an “as is” basis, without warranty. Although every precaution
has been taken in the preparation of this work, neither the author(s) nor Apress shall have any liability to any
person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by
the information contained in this work.
The source code for this book is available to readers at http://www.apress.com.
Download Link

Free Template Website Midnight



Free Template Midnight
created By Freecsstemplate
Download Link

Free Template Website Tecno




Free Template Tecno
created By Freecsstemplate
Download Link

Free Template Website Printing



Free Template Printing
created By Freecsstemplate
Download Link

Free Template Website NIghtvision



Free Template EveerGreen
created By Freecsstemplate
Download Link

Free Template Website Lanscape




Free Template Lanscape
created By Freecsstemplate
Download Link

Free Template Website embouteillage



Free Template EveerGreen
created By Freecsstemplate
Download Link

Free Template Website EverGreen



Free Template EveerGreen
created By Freecsstemplate
Download Link

Free Template Website Illusion



Free Template Illusion
created By Freecsstemplate
Download Link

Free Template Website Description



Free Template description
created By Freecsstemplate
Download Link

Free Template Website eclipse




Free Template eclipse
created By Freecsstemplate
Download Link

Free Template Website


Free Template
created By Freecsstemplate
Download Link

Tuesday, November 18, 2008

User Guide and Tutorial



cPanel: User Guide and Tutorial
Get the most from cPanel with this easy-to-follow guide
Copyright © 2006 Packt Publishing

All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or
transmitted in any form or by any means, without the prior written permission of the publisher,
except in the case of brief quotations embedded in critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy of the
information presented. However, the information contained in this book is sold without warranty,
either express or implied. Neither the author, Packt Publishing, nor its dealers or distributors will
be held liable for any damages caused or alleged to be caused directly or indirectly by this book.
Packt Publishing has endeavored to provide trademark information about all the companies and
products mentioned in this book by the appropriate use of capitals. However, Packt Publishing
cannot guarantee the accuracy of this information.

First published: March 2006

Production Reference: 1030306

Published by Packt Publishing Ltd.
32 Lincoln Road
Olton
Birmingham, B27 6PA, UK.
ISBN 1-904811-92-2
www.packtpub.com
Cover Design by www.visionwt.com
Download Link

Mastering JavaServer


JavaServer

Faces
Bill Dudney
Jonathan Lehr
Bill Willis
LeRoy Mattingly
Wiley Publishing, Inc.
Vice President and Executive Group Publisher: Richard Swadley
Vice President and Executive Publisher: Robert Ipsen
Vice President and Publisher: Joseph B. Wikert
Executive Editorial Director: Mary Bednarek
Editorial Manager: Kathryn A. Malm
Executive Editor:  Robert Elliott
Managing Production Editor: Fred Bernardi
Development Editor: Eileen Bien Calabro, Sharon Nash
Production Editor: Felicia Robinson
Media Development Specialist: Greg Stafford
Text Design & Composition:Wiley Composition Services
Copyright  2004 by Wiley Publishing Inc., Indianapolis, Indiana.
All rights reserved.
Published by Wiley Publishing, Inc., Indianapolis, Indiana
Published simultaneously in Canada
No part of this publication may be reproduced, stored in a retrieval system, or transmitted
in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or
otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright
Act, without either the prior written permission of the Publisher, or authorization through
payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rose-
wood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Pub-
lisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc.,
10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, E-mail:
brandreview@wiley.com.
Download Link

Beginning Programming with Java™ For Dummies®, 2nd Edition


eginning Programming with Java™ For Dummies®, 2nd Edition
Published by
Wiley Publishing, Inc.
111 River Street
Hoboken, NJ 07030-5774
www.wiley.com
Copyright © 2005 by Wiley Publishing, Inc., Indianapolis, Indiana
Published by Wiley Publishing, Inc., Indianapolis, Indiana
Published simultaneously in Canada
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by
any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted
under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permis-
sion of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright
Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to
the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475
Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.
wiley.com/go/permissions.
Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the
Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade
dress are trademarks or registered trademarks of John Wiley & Sons, Inc., and/or its affiliates in the United
States and other countries, and may not be used without written permission. Java is a trademark of Sun
Microsystems, Inc. All other trademarks are the property of their respective owners. Wiley Publishing, Inc.,
is not associated with any product or vendor mentioned in this book
Download Link

XML Schema Essentials

XML Schema Essentials
Publisher: Robert Ipsen
Editor: Cary Sullivan
Developmental Editor: Scott Amerman
Associate Managing Editor: Penny Linskey
Associate New Media Editor: Brian Snapp
Text Design & Composition: D&G Limited, LLC
Designations used by companies to distinguish their products are often claimed as
trademarks. In all instances where John Wiley & Sons, Inc., is aware of a claim, the product
names appear in initial capital or ALL CAPITAL LETTERS. Readers, however, should contact
the appropriate companies for more complete information regarding trademarks and
registration.
This book is printed on acid-free paper.
Copyright © 2002 by R. Allen Wyke and Andrew Watt. All rights reserved.
Published by John Wiley & Sons, Inc.
Published simultaneously in Canada.No part of this publication may be reproduced, stored in a retrieval system or transmitted
in any form or by any means, electronic, mechanical, photocopying, recording, scanning or
otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copy-
right Act, without either the prior written permission of the Publisher, or authorization
through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222
Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4744. Requests to the
Publisher for permission should be addressed to the Permissions Department, John Wiley
& Sons, Inc., 605 Third Avenue, New York, NY 10158-0012, (212) 850-6011, fax (212) 850-
6008, E-Mail: PERMREQ @ WILEY.COM.
Download Link

Webster’s New World® Hacker Dictionary


Webster’s New World® Hacker Dictionary
Published by
Wiley Publishing, Inc.
10475 Crosspoint Boulevard
Indianapolis, IN 46256
www.wiley.com
Copyright © 2006 by Bernadette Schell and Clemens Martin
Published by Wiley Publishing, Inc., Indianapolis, Indiana
Published simultaneously in Canada
ISBN-13: 978-0-470-04752-1
ISBN-10: 0-470-04752-6
Manufactured in the United States of America
10 9 8 7 6 5 4 3 2 1
1O/QZ/QY/QW/IN
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, elec-
tronic,mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976
United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment
of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers,MA 01923, (978)
750-8400, fax (978) 646-8600.Requests to the Publisher for permission should be addressed to the Legal Department,
Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at
http://www.wiley.com/go/permissions.
Download Link

The Practice of Programming


The Practice of Programming
With the same  insight and authority that made their book The Unix Programming
Environment a classic,  Brian Kernighan and Rob  Pike  have written  The Practice
of Programming  to help make  individual  programmers more  effective and
productive.
The practice of programming  is more  than  just  writing code. Programmers must
also assess  tradeoffs,  choose among design alternatives,  debug and test,  improve
performance,  and maintain  software  written by  themselves  and others.  At  the
same  time,  they must  be  concerned  with  issues  like  compatibility,  robustness,
and reliability, while meeting specifications.
The Practice of Programming covers all  these  topics,  and more. This book  is full
of practical advice and  real-world  examples  in C,  C++,  lava,  and  a  variety  of
special-purpose  languages. It includes chapters on:
debugging:  finding bugs quickly and methodically
testing: guaranteeing that software works correctly and reliably
performance: making programs faster and more compact
portability: ensuring that programs run everywhere without change
design: balancing goals and constraints  to decide which algorithms and data
structures are best
interfaces: using abstraction and information hiding to control the  interactions
between components
style: writing  code that works well and is a pleasure to read
notation:  choosing  languages  and  tools  that  let  the machine  do more of  the
work
Download Link

Voic XML2.0


VoiceXML 2.0
Developer’s Guide
Building Professional Voice-Enabled
Applications with JSP™
, ASP, & ColdFusion®
About the Authors
Charul Shukla is a senior programmer at DreamTech Software India, Inc. He has an
excellent track record designing and implementing large-scale applications for the latest
environments. An expert in web-based development and voice-based applications, he is
actively engaged in designing and developing solutions using VoiceXML and related
technologies.
Avnish Dass and Vikas Gupta are the co-founders of DreamTech Software India, Inc.
Avnish is a talented and seasoned programmer with 15 years of experience in systems and
database programming. He has developed numerous security systems, anti-virus programs,
wireless and communication technologies, and voice-based solutions. Vikas holds a B.E. in
electronics, with postgraduate degrees in sales and marketing and in Publishing and Printing
Studies. He is currently engaged in developing and designing new technologies for wireless
and voice-based applications, e-learning, and other cutting-edge areas.
Download Link

Java Game Programing


Attribute Value
CODE
   
Required: The name of the Java class file containing the compiled Appl et
subclass to execute.
WIDTH,
   
Required: The suggested pixel width and height of the area the browser
HEIGHT
   
should reserve for the applet in the Web page.
CODEBAS E
   
The uniform resource locator (URL) of the directory or folder that contains the
applet code. If CODEBAS E is not specified, then the Web browser viewing the
document defaults to the location of the HTML document. COD EBAS E allows
the applet code to be place in a different location than the HTML.
NAME
   
The applet name that other applets on the Web page can use to find it and
communicate with it.
ALT
   
Text displayed by browsers that cannot run the applet. The ALT text is
displayed, for instance, if the user has turned off the Java option in their
browser.
ALIGN
   
The alignment of the applet relative to the text line containing it. This attribute
works like the ALI GN attribute for the I MG tag. The possible values are top,
mi ddI e, bottom, 1 eft, and ri ght. The alignment is bottom by default.
HSPAC E ,
   
The number of pixels of space the browser should leave around the applet
VSPACE
   
on the left and right ( HSPAC E) and top and bottom ( VSPACE).
Download Link

Core JSP


Foreword
In recent years, a large amount of software development activity has migrated from
the client to the server. The client-centric model, in which a client executes complex
programs to visualize and manipulate data, is no longer considered appropriate for the
majority of enterprise applications. The principal reason is deployment—it is a
significant hassle to deploy client programs onto a large number of desktops, and to
redeploy them whenever the application changes. Instead, applications are redesigned
to use a web browser as a "terminal". The application itself resides on the server,
formatting data for the user as web pages and processing the responses that the user
fills into web forms.
If you set out to develop a web application, you need to choose a technology that has
several important characteristics. You need to generate large amounts of dynamic
HTML conveniently. You require access to databases and other services. The
technology must provide an architectural foundation for performance and stability.
Finally, you must be able to partition your program logic in a way that allows for
future growth and maintainability.
Download Link

MySQL Database


Creating your MySQL Database:
Practical Design Tips and
Techniques
A short guide for everyone on how to structure their
data and set up their MySQL database tables eficiently
and easily
Copyright © 2006 Packt Publishing
All rights reserved. No part of this book may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, without the prior written
permission of the publisher, except in the case of brief quotations embedded in
critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy of
the information presented. However, the information contained in this book is sold
without warranty, either express or implied. Neither the author, Packt Publishing,
nor its dealers or distributors will be held liable for any damages caused or alleged to
be caused directly or indirectly by this book.
Packt Publishing has endeavored to provide trademark information about all the
companies and products mentioned in this book by the appropriate use of capitals.
However, Packt Publishing cannot guarantee the accuracy of this information.
First published: November 2006
Production Reference: 1141106
Published by Packt Publishing Ltd.
32 Lincoln Road Olton Birmingham, B27 6PA, UK.
ISBN 1-904811-30-2
www.packtpub.com
Download Link

C++ Professional Programer's



ANSI/ISO C++ Professional
Programmer's Handbook
The precursors of object-oriented programming can be traced back to the late 1960's: Classes, inheritance
and virtual member functions were integral features of Simula67, a programming language that was
mainly used for writing event-driven simulations. When Smalltalk first appeared back in 1972, it offered
a pure object-oriented programming environment. In fact, Smalltalk defined object-oriented
programming. This style of programming was so innovative and revolutionary at the time that it took
more than a decade for it to become a standard in the software industry. Undoubtedly, the emergence of
C++ in the early '80s provided the most considerable contribution to this revolution.
The Origins of C++
In 1979, a young engineer at Bell (now AT&T) Labs, Bjarne Stroustrup, started to experiment with
extensions to C to make it a better tool for implementing large-scale projects. In those days, an average
project consisted of tens of thousands of lines of code (LOC).
Download Link

Nautilus500 Installation Manual


Included Parts
In the accessories bag you will find the
following parts:
1pc. Cool block with 8ft of tubing
(4 ft on each for intake and exhaust)
1pc. AMD Athlon64 (Socket 754, 939, and 940)
retention bracket (2 pc. bracket + 1 pc. screw +
1 pc. metal plate)
1pc. Intel LGA 775 retention bracket
(1 pc. bracket + 4 pc. standoff)
1pc. Intel Socket 478 retention bracket
1pc. Foam Pad
1pc. Syringe with thermal grease
1pc. PCI pass through bracket
with internal 4 pin power connecter
1pc. Power extension cable
2pc. Quick connect self sealing connectors
2pc. Quick grip clamps
1pc. Bottle of coolant
1pc. Operation manual
Attaching the CPU water block
For all types of Central Processing Units  (CPU)
you will need to turn off your system and
disconnect the power. It is recommended to
ground yourself in order to prevent any transfer of
Electrostatic Discharge (ESD) to your system
components while installing the Nautilus500
external water cooling kit. It is required to remove
the current CPU cooling mechanism
from your system prior to installing the
Nautilus500 CPU water block. This includes
removal of the thermal interface material (TIM)
that is used in conjunction with the stock CPU
cooling mechanism. Please see the specific
installation instructions listed below for your
specific type of CPU.
Download Link

Network Programing Wiith TCP/IP



Three interrelated aspects:
m TCP/IP protocol suite
m standard Internet applications
m coding using UNIX sockets API
Books:
1. W. Richard Stevens,  "TCP/IP Illustrated.  Vol. 1: The protocols",  Addison
Wesley,  1994,  (ISBN 0-201-63346-9).
Explains the protocols using network monitoring tools without programming.
2. Douglas E. Comer and David L. Stevens,  "Internetworking with TCP/IP.
Vol.3: Client-server programming and applications BSD socket version",
Prentice Hall,  1993,  (ISBN 0-13-020272-X).
Good book about principles of client/server design.  Assumes you have some
knowledge or at least some other reference for actual programming.
3. Michael Santifaller , translated by Stephen S. Wilson,  "TCP/IP and ONC/NFS
internetworking in a UNIX environment", 2nd Edition,  Addison Wesley,  1994,
(ISBN 0-201-42275-1).
Covers more ground less deeply.  Translation from German seems good.
4. W. Richard Stevens,  "UNIX Network Programming", Prentice Hall,  1990,
(ISBN 0-13-949876-1).
A programming book.  I'm waiting for a copy, but Stevens is a good writer and
this book is recommended by other authors.
Download Link

Cisco Security Setup


Introduction
This paper is the first in a three-part series of white papers, each of which focuses on a functional area of
securing your network. The three papers work together to create a complete picture of how to configure your
network appliances for complete corporate security. It will discuss a starting point for network security, sug-
gested technology types, ideal points for securing your network using a layered approach, and secure ways to
manage your new or existing network.
This first paper in the series introduces concepts to get started on network security and begin the process of
securing your network at the switch level.
Security Policy: Start at the Beginning
Security is one of the fastest growing branches within the networking industry, and current trends point to a
steady increase in growth over the years to come. This is largely due to the integration of so many critical data
types over a single network and the increased realization by companies as to just how vulnerable their net-
works can be.With security becoming such a focal point of networks, it is increasingly important to understand
how to integrate security into a network.
As with any new project, you must start with some direction. I’m sure you have heard the adage, “If you fail to
plan, then you plan to fail.” This is never more true than when planning network security. Create your security
policy to serve as a starting point and future road map for securing your corporation.
A security policy, originally defined in request for comment (RFC) 2196 and now updated in RFC 3704, con-
tains the whys, whats, and hows of securing your corporate environment.
Download Link

Social Media


Social Media
or, “How I learned to stop
worrying and love
communication”

“Markets are conversations.

Markets consist of human beings,
not demographic sectors.

Conversations among human beings
sound human. They are conducted in
a human voice.

The internet is enabling
conversations among human beings
that were simply not possible in
the era of mass media.”


The Cluetrain Manifesto “The internet is a powerful tool.
But most attention seems to focus
on its use as a means of vertical
communications: from one to many.

“…But as important as this is — and
it’s very important indeed — it’s
probably dwarfed by the much more
numerous horizontal communications
that the internet, and related
technologies like cell phones, text
message and the like permit. They
allow a kind of horizontal
knowledge that is often less
obvious, but in many ways at least
as powerful, as the vertical kind.

“Horizontal knowledge is
communication among individuals,
who may or may not know each other,
but who are loosely coordinated by
their involvement with something,
or someone, of mutual interest. And
it’s extremely powerful, because it
makes people much smarter.”

Download Link

Congratulations!!



Congratulations!!
You have purchased a Troy Technologies USA Study Guide.
This study guide is a selection of questions and answers similar to the ones
you will find on the official CCNA exam. Study and memorize the follow-
ing concepts, questions and answers for approximately 15 to 20 hours and
you will be prepared to take the exams.  We guarantee it!
Remember, average study time is 15 to 20 hours and then you are ready!!!
GOOD LUCK!
This study guide and/or material is not sponsored by, endorsed by or affiliated with Cisco
Systems, Inc.  Cisco®, Cisco Systems®, CCDA™, CCNA™, CCDP™, CCNP™,
CCIE™, CCSI™, the Cisco Systems logo and the CCIE logo are trademarks or registered
trademarks of Cisco Systems, Inc. in the United States and certain other countries.  All
other trademarks are trademarks of their respective owners.
Guarantee
If you use this study guide correctly and still fail the exam, send your offi-
cial score notice and mailing address to:
Troy Technologies USA
8200 Pat Booker Rd. #368
San Antonio, TX 78233
We will gladly refund the cost of this study guide. However, you will not
need this guarantee if you follow the above instructions
Download Link

Monday, November 17, 2008

Ajax In Action


Ajax in Action
DAVE CRANE ERIC PASCARELLO
WITH DARREN JAMES


For online information and ordering of this and other Manning books, please go to
www.manning.com. The publisher offers discounts on this book when ordered in quantity.
For more information, please contact:
Special Sales Department
Manning Publications Co.
209 Bruce Park Avenue Fax: (203) 661-9018
Greenwich, CT 06830 email: orders@manning.com
©2006 by Manning Publications Co. All rights reserved.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted,
in any form or by means electronic, mechanical, photocopying, or otherwise, without
prior written permission of the publisher.
Many of the designations used by manufacturers and sellers to distinguish their products
are claimed as trademarks. Where those designations appear in the book, and Manning
Publications was aware of a trademark claim, the designations have been printed in initial
caps or all caps.
Recognizing the importance of preserving what has been written, it is Manning’s policy
to have the books they publish printed on acid-free paper, and we exert our best efforts
to that end
Download Link

ENTERPRISE AJAX

ENTERPRISE AJAX
Strategies for Building High
Performance Web Applications
Dave Johnson, Alexei White, and
Andre Charland
Many of the designations used by manufacturers and sellers to distinguish their products are claimed as
trademarks. Where those designations appear in this book, and the publisher was aware of a trademark
claim, the designations have been printed with initial capital letters or in all capitals.
The authors and publisher have taken care in the preparation of this book, but make no expressed or
implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed
for incidental or consequential damages in connection with or arising out of the use of the information
or programs contained herein.
The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or
special sales, which may include electronic versions and/or custom covers and content particular to your
business, training goals, marketing focus, and branding interests. For more information, please contact:
U.S. Corporate and Government Sales
(800) 382-3419
corpsales@pearsontechgroup.com
For sales outside the United States, please contact:
International Sales
international@pearsoned.com
Download Link

Advanced Ajax


Advanced Ajax
Architecture and Best Practices
Shawn M. Lauriat
Upper Saddle River, NJ • Boston • Indianapolis • San Francisco
New York • Toronto • Montreal • London • Munich • Paris • Madrid
Cape Town • Sydney • Tokyo • Singapore • Mexico CityMany of the designations used by manufacturers and sellers to distinguish their products are
claimed as trademarks. Where those designations appear in this book, and the publisher was
aware of a trademark claim, the designations have been printed with initial capital letters or in
all capitals.
The author and publisher have taken care in the preparation of this book, but make no expressed
or implied warranty of any kind and assume no responsibility for errors or omissions. No liability
is assumed for incidental or consequential damages in connection with or arising out of the use of
the information or programs contained herein.
The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases
or special sales, which may include electronic versions and/or custom covers and content particu-
lar to your business, training goals, marketing focus, and branding interests. For more informa-
tion, please contact:
U.S. Corporate and Government Sales
(800) 382-3419
corpsales@pearsontechgroup.com
For sales outside the United States, please contact:
International Sales
international@pearsoned.com
Download Link

Sunday, November 16, 2008

Free SoftWare

Library Souce CodeCode Download Link
Presensi Souce Code Code Download Link
Souce Code Program Scholl Download Link
Viruss Source Codee Download Link
Retail Manager Source Code Download Link

Sunday, October 19, 2008

TAMAN NASIONAL DANAU SENTARUM

TAMAN NASIONAL DANAU SENTARUM

A. Sejarah Berdirinya Taman Nasional Danau Sentarum


Penunjukan kawasan Danau Sentarum sebagai kawasan Suaka Alam untuk
pertamakalinya pada tahun 1981 dengan status sebagai Cagar Alam yaitu
berdasarkan Surat Keputusan Direktur Jenderal Kehutanan No.
2240/DJ/I/1981 tanggal 15 juni 1981 dengan luas 80.000 ha.
Daerah Danau Sentarum ditetapkan menjadi kawasan Suaka Alam pada
tahun 1982 dengan Surat Keputusan No. 757/Kpts/Um/10/1982 dengan
luas 80.000 ha. Daerah ini dikelola sebagai Suaka Margasatwa oleh
Departemen Kehutanan yang diwakili oleh kantor Sub Balai Konservasi
Sumber Daya Alam Kalimantan Barat yang berkantor di Pontianak.


Pada tahun 1994 Suaka Margasatwa Danau Sentarum ditetapkan menjadi lokasi Ramsar di Indonesia,
karena merupakan salah satu wakil daerah hamparan banjir (lebak lebung, floodplain) yang sangat penting,
tidak saja bagi bangsa Indonesia, namun juga bagi dunia. Taman Nasional Danau Sentarum merupakan
salah satu tipe ekosistem hamparan banjir paling luas yang masih tersisa dalam kondisi baik di Indonesia,
bahkan di Asia Tenggara.

Pada tahun 1999, kawasan Suaka Margasatwa Danau Sentarum berubah fungsi menjadi kawasan Taman
Nasional Danau Sentarum melalui Surat Keputusan Menteri Kehutanan dan Perkebunan No. 34/Kpts-
II/1999 tanggal 4 Pebruari 1999 dengan luas 132.000 ha.
Pada tanggal 1 Februari 2007 melalui Peraturan Menteri Kehuatanan No P.03/Menhut-II/2007, secara
legalitas awal berdirinya Unit Pelaksana Teknis Balai Taman Nasional Danau Sentarum yang berkantor di
Kabupaten Sintang.

B. Kondisi Fisiografis

Letak dan Cakupan Wilayah
Taman Nasional Danau Sentarum berada di wilayah Kabupaten Kapuas Hulu Propinsi Kalimantan Barat. Letaknya
kira-kira 700 kilometer dari Pontianak. Secara administrasi kawasan ini meliputi 7 (tujuh) Kecamatan yaitu
Kecamatan Batang Lupar, Badau, Embau, Bunut Hilir, Suhaid, Selimbau dan Kecamatan Semitau. Secara Geografis
kawasan Taman Nasional terletak di antara 00º45´ - 01º02´ LU dan 111º55´ - 112º26´ BT atau berjarak sekitar 100 km
di sebelah Utara garis Equator.

Topografi

Topografi Danau Sentarum umumnya berbentuk
cekungan datar atau lebak lebung yang merupakan
daerah hamparan banjir yang dikelilingi oleh jajaran
pegunungan, yaitu Pegunungan Lanjak di sebelah Utara,
Pegunungan Muller di Timur, Dataran Tinggi Madi di
Selatan dan Pegunungan Kelingkang di sebelah Barat.

Kondisi Tanah
Pada daerah cekungan datar umumnya jenis tanah
Alluvial yang banyak ditemui di sepanjang tepi sungai
Tawang hingga ke daerah Lanjak dan Leboyan. Pada
daerah perbukitan seperti Bukit Semujan dan Tekenang
dan bukit yang mengelilingi batas Taman Nasional,
jenis tanahnya Podsolik Merah Kuning

Rawa-rawa gambut dalam umumnya dijumpai di bagian
tengah antara komplek Danau Sentarum dengan Sungai
Kapuas (dibagian sebelah Selatan Kawasan). Jenis
gambut Ombrogen merupakan jenis rawa gambut sejati.

Wana Bakti

Pramuka Saka Wanabhakti
TWA Gunung Baung merupakan lokasi pelatihan lapangan Pramuka Saka Wanabhakti Jawa Timur dalam pengurusan hutan atau kehutanan Indonesia. Di kawasan konservasi ini, Pramuka dapat berlatih kesakaan, baik Tata Wana, Reksa Wana, Bina Wana, maupun Guna Wana.

Kegiatan Tata Wana meliputi kegiatan Survey Poyensi Hutan, Pemanfaatan Citra Satelit dan Potret Udara, Tata Batas Hutan, Pembagian Blok dan Zonasi, Penggunaan Peralatan Ukur Kehutanan, dan lainnya.

Kegiatan Reksa Wana meliputi kegiatan Pembinaan Habitat dan Populasi, Inventarisasi Flora dan Fauna, Penangkaran Flora dan Fauna, Pembinaan Desa Model Konservasi, Pengelolaan Sampah, dan lainnya.

Kegiatan Bina Wana meliputi kegiatan pembuatan persemaian pohon, penanaman pohon, penilaian tanaman, pemeliharaan tanaman, dan lainnya.

Kegiatan Guna Wana meliputi kegiatan pengukuran kayu, pemanfaatan limbah kayu, penggunaan tungku hemat, dan lainnya.

Para Wisatawan/Pengunjung/Siswa Sekolah dapat melakukan kegiatan-kegiatan Pramuka Saka Wanabhakti.

Setelah sekian lama kegiatan SAKA WANABAKTI fakcum dengan berbagai alasan baru tanggal 27 nopermber 2007 sampai dengan 3 Nopember 2007 baru dilaksaksanakan, Kalau kita lihat kegiatan Perkemahan Bakti Saka Wanabakti yang dahulu sebelumnya tahun 1994 di jepara, Jawa Tengah baru sekarang lagi diadakan mungkin lebih dari 1 dasawarsa kegiatan ini baru muncul lagi.

Saya sangat salut terutama pada pimpinan SAKA WANABAKTI Nasioanal dalam keadaan yang serba sangat minim dan segala terbatas dari segi dana maupun kepanitian yang sangat memprihatinkan tapi sukses dilaksanakan. Begitu juga dengan seluruh tim peserta dari daerah pun hampir sama seolah-olah SAKA WANABAKTI ini hidup segan mati pun tak mau. Saya yang pada waktu itu menjadi Pamong SAKA untuk kontingen Jawa Timur melihat banyak sekali kekurangan Panitia dalam waktu menjalankan Perkemahan diantaranya banyak terjadi salah komunikasi antara Pimpinan Panitia dengan yang di bawahnya. Tapi itu wajar karena persiapan pun hanya sedilit waktu dari panitia. Saya salut untuk kontingen Jambi yang menjadi Juara Umum karena salah satu pesertanya adalah ALUMNUS SKMA yang notabene mengerti hutan dan kehutanan. Tapi yang kita harapkan ke depan adalah bagaimana kita membuat kader-kader Saka Wanabakti untuk dikenal dimasyarakat terutama Golongan Pemuda dan remaja agar kedepannya menjadi salah satu kader untuk menciptakan kader konservasi kehutanan yang handal.
Sebagai himbauan kepada seluruh rekan-rekan Alumnus SKMA mari kita bangkitkan lagi SAKA WANAbakti sebagai salah satu cara kita kembali mengabdi kepada bangsa ini dengan mencetak kader kehutanan melalui Gerakan Pramuka mungkin bagi seluruh rekan dapat membentuk satuan di tempat kerja Masing-Masing Karena saya yakin semua rekan2 dapat memberikan sekelumit ilmu bagi mereka dan saya yakin Tuhan Pasti membalasnya. Demikian sekelumit tentang Perjalan dalam kegiatan Saka Wanabakti di cibubur Jakarta,
BRAVO SKMA
ATUAN KARYA PRAMUKA WANABAKTI
(SAKA WANABAKTI)

* Satuan Karya Pramuka (Saka) Wanabakti adalah wadah bagi Pramuka Penegak dan Pramuka Pandega untuk melaksanakan kegiatan nyata, produktif dan bermanfaat dalam rangka menanamkan rasa tanggungjawab terhadap pelestarian sumberdaya alam dan lingkungan hidup.
* Tujuan dibentuknya Saka Wanabakti adalah untuk memberi wadah pendidikan di bidang kehutanan kepada anggota Gerakan Pramuka, terutama Pramuka Penegak dan Pramuka Pandega agar mereka dapat membantu membina dan mengembangkan kegiatan pelestarian sumberdaya alam dan lingkungan hidup, melaksanakan secara nyata, produktif dan berguna bagi Pramuka Penegak dan Pramuka Pandega sebagai baktinya terhadap pembangunan masyarakat, bangsa dan negara.
* Kegiatan kesakaan dilaksanakan di gugusdepan dan satuan karya Pramuka disesuaikan dengan usia dan kemampuan jasmani dan rohani peserta didik. Kegiatan pendidikan tersebut dilaksanakan sedapat-dapatnya dengan praktek berupa kegiatan nyata yang memberi kesempatan peserta didik untuk menerapkan sendiri pengetahuan dan kecakapannya dengan menggunakan perlengkapan yang sesuai dengan keperluannya.
* Anggota Saka Wanabakti adalah :
o Pramuka Penegak dan Pramuka Pandega
o Pembina Pramuka sebagai Pamong Saka dan instruktur tetap
o Pemuda calon anggota Gerakan Pramuka yang berusia 16-25 tahun.
* Syarat menjadi Anggota Saka Wana Bakti :
o Membuat pernyataan tertulis secara sukarela untuk menjadi anggota Saka Wanabakti.
o Untuk calon anggota Gerakan Pramuka dan Pramuka Penegak serta Pramuka Pandega, mendapat izin tertulis dari orang tua/wali, pembina Satuan dan Pembina Gugusdepan.
o Untuk Pamong Saka mendapat persetujuan dari Pembina Gugusdepannya dan telah mengikuti Kursus Pembina Pramuka tingkat Dasar.
o Instruktur tetap memiliki pengetahuan, keterampilan, dan kecakapan di bidang Saka Wanabakti.
o Pamong Saka dan Instruktur tetap, diangkat oleh Kwartir Cabang.
o Sehat jasmani dan rohani
o Sanggup mentaati semua peraturan yang berlaku.
* Saka Wanabakti meliputi 4 (empat) krida, yaitu :
o Krida Tata Wana
o Krida Reksa Wana
o Krida Bina Wana
o Krida Guna Wana.
* Krida Tata Wana, terdiri atas 3 (tiga) SKK :
o SKK Perisalah Hutan
o SKK Pengukuran dan Pemetaan Hutan
o SKK Penginderaan Jauh.
* Krida Reksa Wana, terdiri atas 13 (tiga belas) SKK :
o SKK Keragaman Hayati
o SKK Konservasi Kawasan
o SKK Perlindungan Hutan
o SKK Konservasi Jenis Satwa
o SKK Konservasi Jenis Tumbuhan
o SKK Pemanduan
o SKK Penulusuran Gua
o SKK Pendakian
o SKK Pengendalian Kebakaran Hutan dan Lahan
o SKK Pengamatan Satwa
o SKK Penangkaran Satwa
o SKK Pengendalian Perburuan
o SKK Pembudidayaan Tumbuhan.
* Krida Bina Wana, mempunyai 7 (tujuh) SKK :
o SKK Konservasi Tanah dan Air
o SKK Perbenihan
o SKK Pembibitan
o Penanaman dan Pemeliharaan
o SKK Perlebahan
o SKK Budidaya Jamur
o SKK Persuteraan Alam.
* Krida Guna Wana, mempunyai 6 (enam) SKK :
o SKK Pengenalan Jenis Pohon
o SKK Pencacahan Pohon
o SKK Pengukuran Kayu
o SKK Kerajinan Hutan Kayu
o SKK Pengolahan Hasil Hutan
o SKK Penyulingan Minyak Astiri.
* Hasil yang diharapkan setelah mengikuti kegiatan Saka Wanabakti adalah agar para Pramuka Penegak dan Pramuka Pandega :
o Memiliki rasa cinta dan tanggungjawab terhadap hutan dengan segala isi dan kekayaan yang terkandung didalamnya, serta kesadaran untuk memelihara dan melestarikannya.
o Memiliki tambahan pengetahuan, pengalaman, keterampilan dan kecakapan di bidang kehutanan yang dapat mengembangkan pribadinya.
o Memiliki pengetahuan dan keterampilan untuk menghadapi segala tantangan hidup dalam hutan dengan tetap memperhatikan keamanan dan kelestarian hidup.
o Memiliki disiplin dan tanggungjawab yang lebih mantap untuk memelihara kelestarian sumberdaya alam dan lingkungan hidup.
o mampu menyelenggarakan kegiatan-kegiatan Saka Wanabakti secara positif, berdaya guna dan tepat guna, sesuai dengan bakat dan minatnya sehingga berguna bagi pribadinya, masyarakat bangsa dan negara.
o mampu menyebarluaskan pengetahuan, keterampilan dan kecakapannya kepada Pramuka Siaga dan Pramuka Penggalang serta anggota lainnya.


KWARTIR NASIONAL GERAKAN PRAMUKA, Jl. Kawali-Panjlu, INDONESIA,

Bina Wana

semua yang berhubungan dengan pembinaan pelestarian hutan.

Reksa Wana

Reksa berarti melindungi wana berarti hutan jadi Reksa Wana berarti kegiatan yang berhubungan dengan perlindungan hutan.

Guna Wana

Guna berarti memanfaatkan wana berarti hutan jadi Guna Wana berarti memanfaatkan hasil hutan secara produktif dan lestari.

Tata Wana

Tata berarti menata atau mengatur,wana berarti hutan jadi tata wana nempunyai arti menata / mengatur kawasan hutan dan merisalah isinya.
Tau Taa Wana yang dimaksud dalam tulisan ini adalah komunitas yang oleh
pihak luar --- termasuk pemerintah maupun peneliti --- lebih mengenalnya dengan
sebutan To Wana atau Suku Wana. Dikatakan sebagai sebutan pihak luar, karena kata
wana tidak dikenal dalam kosa kata bahasa mereka. Kecuali itu, mereka sendiri lebih
suka mengidentifikasi diri sebagai Tau Taa sesuai bahasa mereka, bahasa Taa.
Untuk tidak menafikan cara mereka mengidentifikasi diri sendiri sebagai “Tau
Taa” sekaligus mengakomodir sebutan “To Wana” dari pihak luar yang sudah terlanjur
populer, maka tulisan ini akan menggunakan sebutan “Tau Taa Wana”. Penggunaan
sebutan “Tau Taa Wana” juga dimaksudkan untuk membedakannya dengan “Topo Taa”
komunitas pengguna bahasa Taa yang tinggal di pesisir.
Seperti halnya komunitas suku pedalaman (masyarakat adat) lain di Indonesia,
Tau Taa Wana acapkali diasumsikan sebagai perambah hutan tropik (paru-paru dunia)
dan pemburu liar yang menjadi penyebab utama hancurnya hutan dan keanekaragaman
hayati, meskipun belum ada penelitian yang membuktikan asumsi tersebut secara
meyakinkan (Primack, 1998: 285-288). Label keterbelakangan, kebodohan, kemiskinan,
serta manusia-manusia liar, juga merupakan penilaian umum yang ditujukan kepada
mereka, baik oleh pemerintah maupun masyarakat dominan.
Asumsi dan penilaian ini kemudian menjadi alat legitimasi untuk mengeluarkan
komunitas suku pedalaman dari kawasan hutan konservasi atau memframing mereka ke
dalam kehidupan normal serta politik kewargaan versi negara: hidup men-desa di bawah
kontrol camat dan kepala desa, serta harus menganut agama-agama yang diakui oleh
Negara. (Budiman, ed,: 2005). Namun dalam banyak kasus, praktek semacam itu ternyata
mendapatkan resistensi (pembangkangan) keras dari komunitas suku pedalaman
Dalam konteks Tau Taa Wana, kutipan artikel berikut mungkin dapat menegaskan
adanya ketegangan hubungan tersebut: “pada 2001 kepala suku Wana bernama Tandao
mengumumkan maklumat: tare pamarenta, tare agama dan tare kampung. Mereka
menolak pemerintah, agama dan perkampungan” (Tempo, 10 Agustus 2003, hlm 70).
Penolakan tersebut menurut Tempo, tidak lepas dari trauma dan pengalaman buruk masa
lalu yang sulit dilupakan.

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites