27
EBOOK DVD 1: ٣d studio max English : Partcle studio fot 3d max Claystudiopro2 for 3dmax ٣dsmax5 installation guide ٣ds max v7.0 technical ٣d studio max manual Farsi : ٣dmax learning(persian) Activex English : Activex programming unleashed Presenting activex Teach yourself activex in 21 days Farsi : Activex آ باي شنايAi & algorithm English : Charles.river.media.ai.application.programming Crc press - fuzzy logic - 1999 - practical applications of computational intelligence for adaptiv Inorder & preorder & postorder Introduction to the design and analysis of algorithms Knowledge-based-intelligent-techniques-in-character-recognition Xor-based hash functions Wrox.beginning.algorithms.nov.2005.ebook-ling Wiley-interscience - model-based signal processing - 2006 Wiley.interscience.jpeg2000.standard.for.image.compression.concepts.algorithms.and.vlsi.architect Wiley.interscience.introduction.to.digital.signal.processing.and.filter.design.oct.2005.ebook-ling Wiley.interscience.introduction.to.digital.signal.processing.and.filter.design.oct.2005.ebook-lin Wideband printed monopole design using a genetic algorithm When hashes collide [applied cryptography] Weighted feature extraction using a genetic algorithm for intrusion detection Vulnerability analysis of ais-based intrusion detection systems via genetic and particle swarm re Volterra-system identification using adaptive real-coded genetic algorithm Using the bch construction to generate robust linear hash functions Using genetic algorithms to estimate confidence intervals for missing spatial data Transmission of fuzzy recognition Towards ant colony optimization of neuro-fuzzy interval rules The teaching company (ttc) - david zarefsky - argumentation, the study of effective reasoning - g The nist cryptographic workshop on hash functions The evolutionary mechanisms in computer immune system The algorithm design manual - springer-verlag (1997) Study of one-way hash function to digital signature technology Springer.evolutionary.computation.for.modeling.and.optimization.dec.2005 Springer,.machine.learning.in.computer.vision.(2005).ddu.lotb Springer - simulating continuous fuzzy systems - 2006 - (isbn 3540284559)(buckley j., et al)(197s Springer - introduction to fuzzy logic using matlab (springer 2006) Spatio–temporal transform based video hashing Software engineering - algorithms - addison wesley (ebook-pdf) Signing a digital signature without using one-way hash functions and message redundancy schemes Security of feature extraction in image hashing Security for authenticated key exchange based on non-malleability Secure evolutionary hardware for public-key cryptosystems School trip attraction modeling using neural & fuzzy-neural approaches Russell s., norvig p. Artificial intelligence- a modern appr Robust t-s fuzzy model-based for chaotic cryptosystem Robust regression based training of anfis Robust image authentication using hash function Robust and secure image hashing Research on optimization of fuzzy membership function based on ant colony algorithm Research of intrusion detection based on immunogenetic technique

EBOOK - AMiner · School trip attraction modeling using neural & fuzzy-neural approaches . Russell s., norvig p. Artificial intelligence- a modern appr . Robust t-s fuzzy model-based

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: EBOOK - AMiner · School trip attraction modeling using neural & fuzzy-neural approaches . Russell s., norvig p. Artificial intelligence- a modern appr . Robust t-s fuzzy model-based

EBOOK DVD 1:

٣d studio max English :

Partcle studio fot 3d max Claystudiopro2 for 3dmax ٣dsmax5 installation guide ٣ds max v7.0 technical ٣d studio max manual

Farsi : ٣dmax learning(persian)

Activex English :

Activex programming unleashed Presenting activex Teach yourself activex in 21 days

Farsi : Activex شنايي باآ

Ai & algorithm English :

Charles.river.media.ai.application.programming Crc press - fuzzy logic - 1999 - practical applications of computational intelligence for adaptiv Inorder & preorder & postorder Introduction to the design and analysis of algorithms Knowledge-based-intelligent-techniques-in-character-recognition Xor-based hash functions Wrox.beginning.algorithms.nov.2005.ebook-ling Wiley-interscience - model-based signal processing - 2006 Wiley.interscience.jpeg2000.standard.for.image.compression.concepts.algorithms.and.vlsi.architect Wiley.interscience.introduction.to.digital.signal.processing.and.filter.design.oct.2005.ebook-ling Wiley.interscience.introduction.to.digital.signal.processing.and.filter.design.oct.2005.ebook-lin Wideband printed monopole design using a genetic algorithm When hashes collide [applied cryptography] Weighted feature extraction using a genetic algorithm for intrusion detection Vulnerability analysis of ais-based intrusion detection systems via genetic and particle swarm re Volterra-system identification using adaptive real-coded genetic algorithm Using the bch construction to generate robust linear hash functions Using genetic algorithms to estimate confidence intervals for missing spatial data Transmission of fuzzy recognition Towards ant colony optimization of neuro-fuzzy interval rules The teaching company (ttc) - david zarefsky - argumentation, the study of effective reasoning - g The nist cryptographic workshop on hash functions The evolutionary mechanisms in computer immune system The algorithm design manual - springer-verlag (1997) Study of one-way hash function to digital signature technology Springer.evolutionary.computation.for.modeling.and.optimization.dec.2005 Springer,.machine.learning.in.computer.vision.(2005).ddu.lotb Springer - simulating continuous fuzzy systems - 2006 - (isbn 3540284559)(buckley j., et al)(197s Springer - introduction to fuzzy logic using matlab (springer 2006) Spatio–temporal transform based video hashing Software engineering - algorithms - addison wesley (ebook-pdf) Signing a digital signature without using one-way hash functions and message redundancy schemes Security of feature extraction in image hashing Security for authenticated key exchange based on non-malleability Secure evolutionary hardware for public-key cryptosystems School trip attraction modeling using neural & fuzzy-neural approaches Russell s., norvig p. Artificial intelligence- a modern appr Robust t-s fuzzy model-based for chaotic cryptosystem Robust regression based training of anfis Robust image authentication using hash function Robust and secure image hashing Research on optimization of fuzzy membership function based on ant colony algorithm Research of intrusion detection based on immunogenetic technique

Page 2: EBOOK - AMiner · School trip attraction modeling using neural & fuzzy-neural approaches . Russell s., norvig p. Artificial intelligence- a modern appr . Robust t-s fuzzy model-based

Real-time route planning of the public transportation system Quadratic approximation-based coordinate change in genetic algorithms Protecting content distribution networks from denial of service attacks Prognostic information fusion for constant load systems Processing xpath queries in pc-clusters using xml data partitioning Proceedings. 2003 ieee international conference on robotics, intelligent systems and signal proce Prentice hall - analysis and applications of artificial neural networks Power optimization for universal hash function data path using divide-and-concatenate technique Pareto-optimal hardware for substitution boxes Optimum configuration for renewable generating systems in residence using genetic algorithm Optimization of membership functions in anomaly detection based on fuzzy data mining Optimal zoning design by genetic algorithms Optimal design of fuzzy controller based on ant colony algorithms On the design of diploid genetic algorithms for problem optimization in dynamic environments On the design of a document protection scheme based on steganography and secret sharing On extractors, error-correction and hiding all partial information Novel steganography detection using an artificial immune system approach Nonlinear least square regression by adaptive domain method with multiple genetic algorithms Ng the identifying code problem by a genetic algorithm New genetic algorithm for the fixed charge transportation problem Neurogenetic design centering Neuro-fuzzy projection pursuit regression Multi-objective evolutionary hardware for rsa-based cryptosystems Multicollision attacks on some generalized sequential hash functions Modified genetic algorithm based feature subset selection in intrusion detection system Mit press - genetic programming Maximizing the hash function of authentication codes Maximal lifetime scheduling in sensor surveillance networks Matrix based asymmetric bulk encryption algorithm Lyapunov-based genetic algorithm controlled linear piezoelectric ceramic motor drive Levenberg-marquardt method for anfis learning Knowledge representation reasoning and declarative problem solving with answer sets K-means algorithm based on particle swarm optimization algorithm for anomaly intrusion detection Jbp,.artificial.intelligence.illuminated.(2004).[0763732303] Jang j.-s.r., sun c.-t., mizutani e. Neuro-fuzzy and soft computing.. A computational approach to learning and machine Irm.press.advances.in.image.and.video.segmentation.may.2006.ebook-ddu Ip address lookup using a dynamic hash function Intrusion detection method research based on optimized self-buildup clustering neural network Intrusion detection based on clustering genetic algorithm Introduction to the design and analysis of algorithms Intelligent support systems technology_ knowledge management (2002) Input selection for anfis learning Image content-based geometric transformation resistant watermarking approach Idea,.advances.in.fuzzy.object-oriented.databases.(2005).[1591403847] Idea group - neural networks in healthcare - potential and challenges - 2006 Idea group - artificial neural networks in real-life applications - 2006 Hybrid learning neuro-fuzzy approach for complex modeling using asymmetric fuzzy sets Human and machine recognition of faces-a survey High-speed hardware architectures of the whirlpool hash function Hiding data in images by optimal moderately-significant-bit replacement Heuristic cryptanalysis of classical and modern ciphers Hash-based proximity clustering for load balancing in heterogeneous dht networks Hash function based on chaotic tent maps Hash function based on chaotic neural networks Handbook_of_evolutionary_computation Gop-based channel rate allocation using genetic algorithm for scalable video streaming over error Genetic algorithm to improve svm based network intrusion detection system Genetic algorithm based methodology for breaking the steganalytic systems Genetic algorithm based 3d face reconstruction Fuzzy systems engineering - theory and practice (springer, 2005) ww Fuzzy synchronization of chaos using gray prediction for secure communications Fuzzy sets and fuzzy logic-klir yuan Fuzzy modeling with spatial information for- geographic problems - f. Petry, et al., (springer, 2 Fuzzy group theory - j. Mordeson, et al., (springer, 2005) ww Fuzzy databases - modeling design and implementation [idea, 2006] Fuzzy control systems.crc press.1993 Fuzzy binary sequences for secure spread-spectrum systems Formulation of an encryption algorithm on the basis of molecular genetics and image patterns Fast nesting of 2-d sheet parts with arbitrary shapes using a greedy method and semi-discrete rep Face recognition- a convolutional neural network approach Face recognition (literature survey) Extended kalman filter neurocontrol for neonate incubator Evolving training model method for one-class svm

Page 3: EBOOK - AMiner · School trip attraction modeling using neural & fuzzy-neural approaches . Russell s., norvig p. Artificial intelligence- a modern appr . Robust t-s fuzzy model-based

Evolving support vector machine parameters Evolutionary computation vol 2, advanced algorithms and operators Enhanced perceptual distance functions and indexing for image replica recognition Energy scalable universal hashing Elsevier,.advances.in.engineering.software,.28.(1997)_.ocr.7.0-2.5.lotb Efficient smoothing of piecewise linear paths with minimal deviation Efficient small-sized implementation of the keyed-hash message authentication code Efficient secret sharing with access structures in a hierarchy Efficient one-time proxy signatures Dynamic key generations for secret sharing in access structures Document clustering using particle swarm optimization Detecting new forms of network intrusion using genetic programming Delta compression with fixed-length substring coding for fast content download Deep packet inspection using parallel bloom filters Data mining with an ant colony optimization algorithm Data clustering using particle swarm optimization Crypto 2004 Cryptanalysis of simplified data encryption standard via optimization heuristics Cryptanalysis of chang et al.'s signature scheme with message recovery Crc press - handbook of computer vision algorithms in image algebra, 2nd ed - 2001 - (by laxxuss) Crc press - computer-aided design engineering and manufacturing systems techniques and applicatio Crc - handbook of neural network dsp Computer science - algorithms - design and analysis of algorithms (1996 khuller) Computational intelligence in reliability engineering new metaheuristics, neural and fuzzy techni Computational intelligence in reliability engineering new metaheuristics neural and fuzzy techniq Complete expression trees for evolving fuzzy classifier systems with genetic algorithms and appli Comparing local search with respect to genetic evolution to detect intrusions in computer network Combining greedy method and genetic algorithm to identify transcription factor binding sites Combination artificial ant clustering and k-pso clustering approach to network security model Collaborative channel affectation vs greedy method Chaos-genetic algorithm for multiobjective optimization Cafe - collaborative agents for filtering e-mails Business applications and computational intelligence (2006) Bioinformatics on a heterogeneous java distributed system Binary sequences with good spectral properties obtained by genetic algorithms Beginning.algorithms Authenticated diffie-hellman key agreement protocol using a single cryptographic assumption Artificial life evolution of security vulnerability agents Artificial immune theory based network intrusion detection system and the algorithms design Argumentation, study of effective reasoning (zarefsky) teaching company (ttc) guildebook 2 Applied fuzzy arithmetic - an introduction with engineering applications - m. Hanss (springer, 20 Ant colony optimization for best path planning Ant algorithms for discrete optimization Anomaly intrusion detection using multi-objective genetic fuzzy system and agent-based evolutiona Anomaly detection based on unsupervised niche clustering with application to network intrusion de An unsupervised particle swarm optimization classifier for sar image An induction learning approach for building intrusion detection models using genetic algorithms An improved algorithm for fuzzy data mining for intrusion detection An immunity-based technique to characterize intrusions in computer networks An immune genetic model in rule-based state action ids An evolutionary fuzzy modeling approach for anfis architecture An enhanced remote login authentication with smart card An efficient network intrusion detection method based on information theory and genetic algorithm An efficient key predistribution scheme for ad hoc network security An application of decision support to network intrusion detection An adaptive constant time hashing scheme for dynamic key set Algoritms Adaptive neuro-fuzzy inference system for modelling and control Adaptive intrusion detection algorithm based on learning algorithm Adaptive fuzzy prediction of low-cost inertial-based positioning errors Academic press - neural networks in finance (2006) Academic press - intelligent communication systems (2002) Academic press - fuzzy logic,a practical approach by f martin mcneill and ellen thro - 1994 Academic frontiers of evolutionary computation (2004) A symmetric cryptography based on extended cellular automata A software implementation of a genetic algorithm based approach to network intrusion detection A smart-card-based remote authentication scheme A self-adaptive genetic algorithm for tasks scheduling in multiprocessor system A saw-tooth genetic algorithm combining the effects of variable population size and reinitializat A proposal of short proxy signature using pairing A pixel block fuzzy similarity measure applied in two applications A parallel genetic algorithm for the optimal design of multi-body model vehicle suspensions A novel training algorithm in anfis structure

Page 4: EBOOK - AMiner · School trip attraction modeling using neural & fuzzy-neural approaches . Russell s., norvig p. Artificial intelligence- a modern appr . Robust t-s fuzzy model-based

A novel intrusion detection method based on clonal selection clustering algorithm A novel framework for network intrusion detection using learning techniques A novel congruent organizational design methodology using group technology and a nested genetic a A novel approach to intrusion detection based on support vector data description A new query reweighting method for document retrieval based on genetic algorithms A new digital signature scheme without one-way hash functions and message redundancy A multiple objective optimization based echo state network tree and application to intrusion dete A machine learning framework for network anomaly detection using svm and ga A low power lookup technique for multi-hashing network applications A genetic algorithm for the design space exploration of datapaths during high-level synthesis A framework of greedy methods for constructing interaction test suites A fragile watermarking scheme for medical image A convergence proof for ant colony algorithm A comparative study of techniques for intrusion detection A comparative study of learning methods in tuning parameters of fuzzy membership functions A collaborative and multi-agent system for e-mail filtering and classification A collaborative and multi-agent approach to e-mail filtering [baeck, t, fogel, db, michalewicz, z] evolutionary computation vol 1 basic algorithms and operato [b] lopez b.&co(eds) artificial intelligence research and development [faia-131] (ios,2005)(t)(45 [b] 501 challenging logic & reasoning problems (2ed,learningexpress,2005)(t)(161s) Nonself space approach to network anomaly detection A framework of greedy methods for constructing interaction test suites Method of evolutionary neural network-based intrusion detection Load balancing with multiple hash functions in peer-to-peer networks Energy efficient data retrieval and caching in mobile peer-to-peer networks Efficient architecture and hardware implementation of the whirlpool hash function

Farsi : Genetic مقدمه اي بر طراحي و تحليل الگوريتم ھا مقدمه اي بر شبكه ھاي عصبي

ه برنامه ريزي توليدمقايسه عملكرد دو روش ھوشمند الگوريتم ژنتيكي و الگوريتم پرندگان در حل مسئل مرجع ھوش مصنوعي مرجع ساختمان داده ھا و الگوريتم ھا طبقه بندي داده ھا توسط مورچه ھاي فازي سيري در منطق فازي بھبود تصوير بازيافتي از فشرده سازي بلوكي با استفاده از منطق فازي بررسي ساختارھاي متداول الگوريتم ژنتيكJenetik Desبررسي الگوريتم Control konandeye fazi

Backup English :

Sql server 2000 backup and restore Net backup 3.2 Linux-complete-backup-and-recovery-howto Large database backup & restore Jade_developing a backup strategy Data recovery & repair a parctical handbook

Farsi : ستم عامل ھاي مايكروسافت در سي backup

Compilers English :

Charles.river.media.algorithms.for.compiler.design Engineering a compiler (2003) Compilers and compiler generators in c++ (1996) Compilers - principles, techniques and tools by alfred aho, Compiler design -- the implementation of functional programming languages - slpj-book-1987 Compiler design -- compilers principles, techniques and tools - aho, sethi, ullman (addison wesle Apress,.build.your.own.dot.net.language.and.compiler.(2004).lib

Farsi : Compiler.project.source.and.tut.by.mohammad_bashiry جزوه درس طراحی و ساخت کامپايلرھا

Computer architecture English :

Systemarchitecturebook Principles of computer architecture [prentice hall] Prentice hall - principles of computer architecture (by miles murdocca, vincent p. Heuring, 1999) Mather p. Computer processing of remotely-sensed images.. An introduction (3rd ed)(isbn 047084918

Page 5: EBOOK - AMiner · School trip attraction modeling using neural & fuzzy-neural approaches . Russell s., norvig p. Artificial intelligence- a modern appr . Robust t-s fuzzy model-based

Intel architecture software developer’s manual (volume 2) Intel architecture software developer’s manual (volume 1) Fundamentals of computer organization and architecture (2005) wiley Digital logic and microprocessor design with vhdl ebook-electronix

Data base English :

Developing database applications Developing distributed applications Oracle unleashed Teach yourself sql in 21 days second edition Wiley-interscience - relational database index design and the optimizers - db2, oracle, sql serve Web database step-by-step guide The guru’s guide to transact-sql Sql usage Sql server 2000- designing and implementing olap solutions Sql server 2000 data base for .net enterprise servers Oreilly.oracle.pl.sql.programming.4th.edition.aug.2005 Olap wrox - professional sql server 2000 data warehousing with analysis services (2001) Olap mspress - preparing and mining data with sql server 2002 and analysis services [2002] Normalization in data base Mysql manual Mssql2005_oracle10g_compare Features, strengths and weaknesses comparison between ms sql 2005 (yukon) and oracle 10g databases Distributed systems architecture _ a middleware approachleefrom_1_to_342 Db2 tools, data warehousing and olap Db2 security and instances Database systems ( thomas connolly ) Database system concepts-4th-mcgraw hill Database objects Database management systems Database concurrency Creating and accessing db2 databases Apress,.expert.oracle.database.architecture.9i.and.10g.programming.techniques.and.solutions.(2005 An assessment of the oracle password hashing algorithm Advanced database technology and design (artech house-2000) (ebook - pdf)learnkey how to design a database - sql and crystal report

Farsi : ايگاھھاي اطالعاتي موجود در پژوھشكده تعليم و تربيتمعرفي پ

_مثال و نحوه كار sqlفرمانھاي گزارش گيري از بانك اطالعاتي راھنماي مقدماتي برنامه نويسان پايگاھھاي اطالعاتي sql serverراھكارھايي براي افزايش سرعت در بانك ھاي اطالعاتي

و دكتر احمد فراھيمولفين مھندس سيد ناصر آيت -پايگاه داده ھا دادهsamآشنايی با پايگاه اصول طراحي پايگاه دادهMysqlراھنماي سريع استفاده از پايگاه داده Moqayeseye sql sarver & oracle

Data mining & data warehouse English :

Wiley-interscience - discovering knowledge in data an introduction to data mining - 2005 Wiley-applied data mining statistical methods for business and industry Wiley.data.mining.with.sql.server.2005.sep.2005.ebook-ddu Wiley - ieee press - data mining methods and models jan 2006 Wiley - data mining cookbook - modeling data for marketing, risk, and customer relationship manag Survey of text mining - clustering, classification, and retrieval Morgan kaufmann,.data mining - practical machine learning tools and techniques, 2nd edition.[2005 John.wiley.&.sons.-.data.mining.techniques.for.marketing.sales.and.customer.support.(2004),.2ed Intro-dm Idea group publishing intelligent agents for data mining and information retrieval ebook-ddu Elsevier, data mining practical machine learning tools (2005), 2ed ddu; ocr 7.0-2.6 Data mining intro handout Data mining cookbook - modeling data for marketing, risk, and crm (wiley, 2001) Data mining - multimedia, soft computing, and bioinformatics - mitra & acharya - wiley 2003 Crc press - web data mining and applications in business intelligence Applied data mining Analytic-techniques-machine-learnings-and-data-mining-for-semantic-web_en [semantic web] intelligent agents for data mining and information retrieval

Farsi :

مقدمه اي بر داده کاوي و اکتشاف دانش

Page 6: EBOOK - AMiner · School trip attraction modeling using neural & fuzzy-neural approaches . Russell s., norvig p. Artificial intelligence- a modern appr . Robust t-s fuzzy model-based

داده کاوی با استفاده از استنتاج ويادگيری بيزیData mining Daata mining (data warehouse) مقدمه اي بر انبار داده ھا

Data security English :

Aes (advanced encryption standard) Crc press - handbook of applied cryptography (algorithms, mathematics, science, source code) Cryptanalysis Fips Hash algorithm Key exchange Other encryption method Pgp Pki Rsa Ssl Xml based security for e-commerce applications Wiley, hiding in plain sight steganography and the art of covert communication Watermarking jbig2 text region for image authentication Utilization of multiple block cipher hashing in authentication and digital signatures Unconditionally secure signatures and its related schemes Threshold signcryption scheme based on elliptic curve cryptosystem and verifiable secret sharing Three-dimensional imaging and processing using computational holographic imaging Theoretical analysis of a correlation attack based on convolutional codes Theorem proving for modeling and conflict checking of authorization policies Steganalysis of embedding in two least-significant bits Statistical restoration for robust and secure steganography Stallings, william - cryptography and network security 4th ed - prentice hall - (2005) Soft computing approach to steganalysis of lsb embedding in digital images Signature-based approach to fair document exchange Short mceliece-based digital signatures Security technology Security of chien's efficient time-bound hierarchical key assignment scheme Security of ad hoc networks and threshold cryptography Security for industrial communication systems Security architecture for web-based health insurance systems Security and robustness enhancement for image data hiding Secure third party distribution of xml data Secure sockets layer Secure key exchange over 1.9 km free-space range using quantum cryptography Secure internet access to gateway using secure socket layer Secure information by using digital data embedding and spread spectrum techniques Secure e-voting with blind signature Secure electronic data interchange over the internet Secure advanced video coding based on selective encryption algorithms Secret sharing schemes from three classes of linear codes Schneier - applied cryptography 2ed - wiley Rsa encryption algorithm based on torus automorphisms Robust turbo-based data hiding for image and video sources Robust data-hiding in audio Robust data hiding for images Revisiting public-key cryptography for wireless sensor networks Reversible data-embedding with a hierarchical structure Reversible data hiding Reversible data hiding based on wavelet spread spectrum Reversible data embedding into images using wavelet techniques and sorting Randomness in cryptography Quantization-based image steganography without data hiding position memorization Public-key encryption based on chebyshev maps Public-key cryptography using paraunitary matrices Public key encryption and digital signatures based on permutation polynomials Public key cryptography with matrices Private key and public key quantum cryptography Privacy-enhanced internet storage Pki and digital certification infrastructure Performance analysis of a medical record exchanges model Partial identification of lorenz system and its application to key space reduction of chaotic cry Optimized feature extraction for learning-based image steganalysis Optimal signature design for spread-spectrum steganography On the security of joint signature and hybrid encryption

Page 7: EBOOK - AMiner · School trip attraction modeling using neural & fuzzy-neural approaches . Russell s., norvig p. Artificial intelligence- a modern appr . Robust t-s fuzzy model-based

On the security of a digital signature with message recovery using self-certified public key On the power of quantum memory On the optimum constructions of composite field for the aes algorithm On the hardware design of an elliptic curve cryptosystem On fundamental limitations of proving data theft Next generation techniques for robust and imperceptible audio data hiding News briefs New concepts in evolutionary search for boolean functions in cryptology Mit press - privacy on the line. The politics of wiretapping and encryption Lossless generalized-lsb data embedding Lossless data hiding in lzw compression Lossless data hiding based on integer wavelet transform Kluwer - fundamentals of cryptology, a professional reference and interactive tutorial Joint security and robustness enhancement for quantization based data embedding John wiley & sons - teamlib - cryptography for dummies Is image steganography natural Invariant bilinear forms and its application in information security Internet x.509 public key infrastructure proxy certificate profile Integrated approach for fault tolerance and digital signature in rsa Inserted chaotic-sequence cryptography and supported software's investigation Information_hiding_techniques_for_steganography_and_digital_watermarking Increasing user privacy in online transactions with x.509 v3 certificate private extensions and s Improving the security of a dynamic look-up table based chaotic cryptosystem Implementation of distributed key generation algorithms using secure sockets Image data embedding system for watermarking using fresnel transform Idea group - multimedia security - steganography and digital watermarking techniques for protecti Id-based ring authenticated encryption Hybrid key establishment for multiphase self-organized sensor networks High capacity data embedding in the wavelet domain Hiding information in images Hiding data in multitone images for data communications Halftone visual cryptography Grid colorings in steganography Fuzzy modular arithmetic for cryptographic schemes with applications for mobile security Free-space quantum cryptography and satellite key uploading Formatted text document data hiding robust to printing, copying and scanning Farsi_template Extended rsa cryptosystem and digital signature schemes in the domain of gaussian integers Encyclopedia of cryptology Elsevier press - 0120471442 - data hiding fundamentals and applications content security in digit Elliptic curve cryptography engineering Efficient authenticated encryption schemes with public verifiability Effective image retrieval based on hidden concept discovery in image database E-book - lock pick - cryptology and physical security Dsa-based verifiable and recoverable encryption of signatures and its application in certified e- Dsa Document image secret sharing using bit-level processing Document image data hiding technique using character spacing width sequence coding Divider architecture for cryptography systems Digital signatures Developing a cryptology algorithm by using wavelet transform Design and implementation of smartcard-based secure e-mail communication Des Defeating_encryption Decoding codes with the identifiable parent property Deciding knowledge in security protocols under (many more) equational theories Data-hiding in audio using frequency-selective phase alteration Data security-cryptography=privacy Data hiding system by fresnel transform Data hiding of binary images using pair-wise logical computation mechanism Data hiding in video Data hiding in the bit stream domain for mpeg-2 coded video sequences exploiting space and freque Data hiding in images with adaptive numbers of least significant bits based on the human visual s Data hiding in image and video .i. Fundamental issues and solutions Data hiding in curves with application to fingerprinting maps Data hiding in binary image for authentication and annotation Data embedding in text for a copier system Data embedding in audio using time-scale modification Customizable elliptic curve cryptosystems Cryptology for digital tv broadcasting Cryptology and physical security - rights amplification in master-keyed mechanical locks Cryptography in the quantum world Cryptographic applications of brahmagupta-bha-spl tilde-skara equation

Page 8: EBOOK - AMiner · School trip attraction modeling using neural & fuzzy-neural approaches . Russell s., norvig p. Artificial intelligence- a modern appr . Robust t-s fuzzy model-based

Cryptic primes Configuring enterprise public key infrastructures to permit integrated deployment of signature, e Component-based security model for xml messaging services Communications cryptography Cheating prevention in visual cryptography Certified e-mail delivery with dsa receipts Capacity estimates for data hiding in compressed images Cambridge, complexity and cryptography an introduction (2006) ddu Bounded gaussian fingerprints and the gradient collusion attack [multimedia fingerprinting applic Audio data hiding with application to surround sound Aspects of authentication and cryptology Applied cryptology.cryptographic protocols.computer security models An introduction to contemporary cryptology An introduction to block cipher cryptanalysis An image watermarking technique using cellular automata transform An examination of a web-based advanced encryption standard system An embedding multiplex signatures in binary images by using pattern dither method An efficient threshold group signature scheme An efficient message digest algorithm (md) for data security An area-efficient universal cryptography processor for smart cards An architecture for end-to-end and inter-domain trusted mail delivery service An adaptive constant time hashing scheme for dynamic key set Agent based multiple level dynamic multimedia security system Advances.in.cryptology.crypto.2004(2005) A watermarking method based on fractal self-similarity A transcoding robust data hiding method for image communication applications A survey on mix networks and their secure applications A study on detecting image hiding by feature analysis A study of the elliptic curve cryptology applies to the next generation protocol A steganographic method for hiding data in vq encoded images A source and channel-coding framework for vector-based data hiding in video A secure mechanism for network authentication combining hand shapes verification and encryption A secure and fair dsa-based signature exchange protocol A scalable encryption method allowing backward compatibility with jpeg2000 images A public-key cryptographic processor for rsa and ecc A protocol for designated confirmer signatures based on rsa cryptographic algorithms A proposal of architectural elements for implementing secure software download service in softwar A primer on cryptography in communications A practical multipurpose color image watermarking algorithm for copyright protection and image au A novel unified architecture for public-key cryptography A novel high-capacity data-embedding system A novel compression and encryption scheme using variable model arithmetic coding and coupled chao A novel approach for increasing security and data embedding capacity in images for data hiding ap A new steganographic method for data hiding in microsoft word documents by a change tracking tech A new cembs based on rsa signatures and its application in constructing fair exchange protocol A minimum distortion data hiding technique for compressed images A method of safety communication for mobile agent A jca-based implementation framework for threshold cryptography A general secure electronic auction protocol A framework for secure download for software-defined radio A framework for describing block cipher cryptanalysis A distributed multipurpose mail guard A data embedding scheme for h.263 compatible video coding A comprehensive framework for enhancing security in infiniband architecture A comment on cryptographic applications of brahmagupta-bhaskara equation Privacy in mobile agents [springer] decrypted secrets - methods and maxims of cryptology, 4th edition (2007) [enginnering] crc press - handbook of applied cryptography (algorithms, mathematics, science, sou [auerbach publications] investigator's guide to steganography [isbn0849324335] [2003] (ebook) applied cryptography - protocols, algorithms, and source code in c

biometrics electronic purse a secure conditional access system using digital signature and encryption a blind source separation based method for speech encryption Farsi :

معرفي رمز نگاري و امضاء ديجيتالي رمزنگاري و رمزگشايي امن سازي مبادالت الكترونيكي با گواھي ديجيتال_امضاي ديجيتالي و مراکز صدور گواھينامه sslمفاھيم

Rsaمقدمه اي بر سيستم كدگذاري Finger print

Directx

Page 9: EBOOK - AMiner · School trip attraction modeling using neural & fuzzy-neural approaches . Russell s., norvig p. Artificial intelligence- a modern appr . Robust t-s fuzzy model-based

English : Teach yourself directx in 24 hours (en)

Dotnetnuke

English : Wrox - professional dotnetnuke asp dot net portals 2005 Packt.publishing.building.websites.with.vb.net.and.dotnetnuke.4.oct.2006 Dotnetnuke 3 installation and configuration.wmv

Ecommerce English :

Wiley,.ebxml.simplified.a.guide.to.the.new.standard.for.global.e-commerce.(2002)_.bm.ocr.6.0.shar The complete e-commerce book design -build and maintain a successful web based business Relationship marketing - dialogue and networks in the e-commerce era Irm press, e-commerce and m-commerce technologies (2005) yyepg ocr 7.0-2.6 lotb E-commerce.and.m-commerce.technologies.(2004) E-commerce and development 2003 E-commerce - essential guide online marketing finance Business e-business - new directions in research on e-commerce - c steinfield (purdue university

Fast & crystal report English :

Wrox.professional.crystal.reports.for.visual.studio.dot.net.2nd.edition.apr.2004.ebook-ddu Wiley-crystal.reports.10.for.dummies-2004

Farsi : (delphi) fast report3آموزش مقدماتي Fast report learning part 1 Crystalreport3 Crystalreport2 Crystalreport Crsystalreports.net

Flash

English : Flash 5.0 learning Flash tutorials Using_flash_5 (en) Using macromedia flash mx 2004 Flashmxtutorials Forum designing

Farsi : ين يك ھاست مجازي و ھمچن lycos بر روي phpbbطريقه نصب انجمن

چگونه فورومinvision power boardرا نصب و فارسي كنيم؟ Forum guide

General topics English :

ايمني بدن در ھنگام كار با كامپيوترMake friends with your computer

Farsi : بيل گيتس وضعيت رقومي ايران

تاريخي ايران‐ اطالعات نوين در معرفي ھويت فرھنگينقش فناوري مطالعه موفق با تمركز مردان گوگل

١٣٨٠ارديبھشت _مجموعه مقاالت دومين كنفرانس آموزش باز و از راه دور پياده سازی يک سيستمocrفارسی با استفاده از عملگرھای مورفولوژي راھنماي بورس تحصيلي تكامل تدريجي يك برنامه نويس تاثير كامپيوتر و اينترنت بر كودكان و نوجوانانMathmathica4 Learn proteus Learn franklin چگونه دکترا بگيريمComputer learning

Graphical application's English :

Page 10: EBOOK - AMiner · School trip attraction modeling using neural & fuzzy-neural approaches . Russell s., norvig p. Artificial intelligence- a modern appr . Robust t-s fuzzy model-based

Using_freehand_10 Ulead videostudio 9.0 Macromedia dreamweaver mx 2004 Editing_in_arcmap

Farsi : Multi media muilder معرفي اتوكدAutocad 14

Hard ware English :

How to upgrade your pc Different amd support chipset specification Different intel support chipset specification Different proccessors specification Interfacing the serial rs232 port v5.0 Smart-ups (models 900,1250 and 2000) Understanding hard disks Ups battery charger options Usb-in-a-nutshell

Farsi : Gigabyte mainboard Adata 256512mb ddrsdram 400mhz Cd witer teac 52x24x52 Dvdھمه چيز از فرمت Flat-crt`s Ga-8pe800pro Gmax gd-1701dluنمايشگر Jacksensingتكنولوژي Motherboard Satisfaction excellence evolution difference(seed) of gigabyte Scaner Teac 52x Ups Vdata 256mb ddrsdram 266333mhz انواع فناوري در صفحه نمايشھاي لمسي خصوصيات و تشريح و نحوه انتخاب انواع سخت افزار مرجع توضيحي خطاھاي مودم

Image procesing English :

A novel compression technique for super resolution color photography Image compression with structure-aware inpainting Low-rate and flexible image coding with redundant representations (ebook) john wiley & sons - video codec design 2002 [crc press] computer visualization - graphics techniques for engineering and scientific analysis Wiley.interscience.2-d.and.3-d.image.registration.for.medical.remote.sensing.and.industrial.ap A co-evolutionary competitive multi-expert approach to image compression with neural networks A comparison of principal component analysis and generalized hebbian algorithm for image compress A flexible hardware jpeg 2000 decoder for digital cinema A high-performance architecture for embedded block coding in jpeg 2000 A mesh-based disparity representation method for view interpolation and stereo image compression A modified spiht algorithm for image coding with a joint mse and classification distortion measur A new approach for sa-based fractal image compression A new graphic cryptosystem based on one-dimensional memory cellular automata A new image encryption algorithm based on chaos system A new image encryption algorithm based on inversable functions defined on galois fields A novel approach of reordering color palette for indexed image compression A novel block cipher based on hierarchy of one-dimensional composition chaotic maps A novel image encryption scheme based-on jpeg encoding A novel interactive progressive decoding method for fractal image compression A novel lossless image compression algorithm using arithmetic modulo operation A novel method of lossy image compression for digital image sensors with bayer color filter array A parallel image compression system for high-speed cameras A practical course in digital video communications based on matlab A quad-tree decomposition approach to cartoon image compression A range-domain approximation error-based approach for fractal image compression A secret sharing scheme for image encryption A self-adaptive image encryption algorithm based on composite discrete chaotic system A simplified mpc for image compression A symmetric image encryption approach based on line maps A two-pass improved encoding scheme for fractal image compression

Page 11: EBOOK - AMiner · School trip attraction modeling using neural & fuzzy-neural approaches . Russell s., norvig p. Artificial intelligence- a modern appr . Robust t-s fuzzy model-based

Academic press - handbook of image and video processing - 2000 - (by laxxuss) Adaptive downsampling to improve image compression at low bit rates Adaptive prediction trees for image compression Adaptive-quantization digital image sensor for low-power image compression An asymmetric image encryption based on matrix transformation An enhanced chaos based image encryption algorithm An experience in image compression using neural networks An image encryption algorithm based on mixed chaotic dynamic systems and external keys An image encryption approach based on a new two-dimensional map An image encryption scheme based on chaotic systems Application of data encryption standard to bitmap and jpeg images Architecture design and vlsi hardware implementation of image encryption-decryption system using Architecture design of the re-configurable 2-d von neumann cellular automata for image encryption Bayes.bayesian approach to image interpretation (kluwer, 2002)(kopparapu, desai)(144s) Binary image encoding using 1d chaotic maps Binary image transformation using two-dimensional chaotic maps Block tree partitioning for wavelet based color image compression Color image compression using mutual spectral information Colour image secret sharing Comparison criteria for optimum image compression Complementary image compression based on the theory of fuzzy information granulation Compound image compression for real-time computer screen image transmission Compression of colour images by inter-band compensated prediction Concurrency techniques for arithmetic coding in jpeg2000 Crc press - image recognition and clasiffication (2006) Crc press understanding surveillance technologies spy devices, their origins & applications Decryption system using 2-d cellular automata Dekker - biosignal and biomedical image processing - matlab based applications - 2004 - (by laxxu Design and graphics - crc press - digital color imaging handbook Design and graphics - digital image processing Detecting computer-induced errors in remote-sensing jpeg compression algorithms Distributed source coding theorem based region of interest image compression method Document image secret sharing using bit-level processing Effect of image compression on iris recognition Effective palette indexing for image compression using self-organization of kohonen feature map Efficient encryption of compressed color images Efficient rate control for jpeg-2000 Enhanced chaotic image encryption algorithm based on baker's map Expert knowledge based automatic regions-of-interest (roi) selection in scanned documents for dig Extensible jpeg2000 image compression systems Fractal color image compression on a pseudo spiral architecture Fractal image compression on spiral architecture Goutsias, vincent, bloomberg (eds) mathematical morphology and its applications to image and sign High-dynamic-range still-image encoding in jpeg 2000 High-quality dct-based image compression using partition schemes Hyperspectral image compression using jpeg2000 and principal component analysis Image compression based on btc-dpcm and its data-driven parallel implementation Image confidentiality using progressive jpeg Image encrypted system using scan patterns and 2-d cellular automata Image encryption algorithm based on chaotic sequence Image encryption and decryption by means of an optical phase mask Image encryption and decryption using scan methodology Image encryption based on a novel reality-preserving Image encryption using infinite series convergence Image encryption using progressive cellular automata substitution and scan Image.processing.in.c Improved baker map for image encryption Improvement of dct-based compression algorithms using poisson's equation Improving an encryption scheme adapted to jpeg stream encoding John wiley & sons - digital image processing - piks inside - 3rd edition - 2001 Lossless image compression with bctw Matrix factorizations for parallel integer transformation Motion vector encryption in multimedia streaming Multiscale recurrent patterns applied to stereo image coding Nonlinear image representation for efficient perceptual coding On multirate optimality of jpeg2000 code stream On the security of an image encryption method On the use of context-weighting in lossless bilevel image compression On the use of standards for microarray lossless image compression Optical image encryption based on dyadic phase permutation in fourier domain Oriented wavelet transform for image compression and denoising Perceptual adaptive insensitivity for support vector machine image coding Performance evaluation of functional medical imaging compression via optimal sampling schedule de

Page 12: EBOOK - AMiner · School trip attraction modeling using neural & fuzzy-neural approaches . Russell s., norvig p. Artificial intelligence- a modern appr . Robust t-s fuzzy model-based

Petrou m., bosdogianni p. Image processing.. The fundamentals (wiley, 1999)(t)(355s) Prentice hall - image processing with labview and imaq vision Progressive scalable interactive region-of-interest image coding using vector quantization Randy crane - a simplified approach to image processing, classical and modern techniques in c - 1 Recovering dc coefficients in block-based dct Region-of-interest image coding based on ebcot Rf microwave system analysis for wideband radar & remote sensing-yan zhang Robotics dekker - understanding and applying machine vision, 2nd ed - 2000 - (by laxxuss) Robotics_handbook_of_computer_vision_algorithms_in_image_algebra Secure display system by use of encrypted digital holograms Secure image communication using blind source separation Selective encryption of human skin in jpeg images Shared key encryption of jpeg color images Single-sensor camera image compression Skeleton based image encryption Spatial-polarization state scrambling for image encryption obtained with subwavelength gratings Stein a., et al. (eds) spatial statistics for remote sensing (kluwer 2002)(400dpi)(t)(301s)_mvsa_ Strengths and weaknesses of optical encryption algorithms The application of chaotic maps in image encryption The cryptanalyses of the discretized baker map and an enhanced arithmetic The general formula and algorithm of the discretized baker map Three-dimensional imaging and processing using computational holographic imaging Three-dimensional medical imaging algorythms-p421-stytz Wiley - intelligent image processing Wiley,.digital.video.quality.vision.models.and.metrics.(2005).ddu.lotb Wiley,.image.processing.and.jump.regression.analysis.(2005).ddu.lotb Wiley-vch - robot vision - video-based indoor exploration with autonomous and mobile robots - 200 Wilsky a.s. multiresolution markov models for signal and image processing(t)(111s)

It & hack & web security English :

Google api Virus ٣d graph visualisation of web normal and malicious traffic A novel web security evaluation model for a one-time-password system A survey of web security An administration model of drbac on the web An integrated web security system Art-of-injection Au_2007_tech_salarysurvey Authorization schemes for large-scale systems based on java, corba and web security models Client-end cryptographic extensions threat analysis & implementation of dns routing attacks Controlling epics from a web browser Developing secure web applications Enhancing the security of web applications Experiences running a web anonymising service From web server security to web components security Greythorn salary index 200708 Guide_appsecurity Information technology Information_and_communication_technology_for_competitive_intelligence Intrusion detection systems(ids) with snort advanced ids techniques using snort, apache, mysql, php, and acid National science foundation - converging technologies for improving human performance - nanotechn New plan issues standard ids for viruses O'reilly google hacks 2nd edition (2005) O'reilly google hacks Secured net-banking by spl theta-vigenere in syverson's protocol Self-describing delegation networks for the web Specifying and enforcing application-level web security policies Springer - algorithm design for networked information technology systems - 2004 - (by laxxuss) Sub seven v2.2 Threats and security of web services - a theoretical short study Trustworthy web services based on testing Web application security assessment tools Web server attack categorization based on root causes and their locations Why applying standards to web services is not enough Wiley - the executive's guide to information technology Www distribution of private information with watermarking

Farsi : Cracking Hack-learing نشر الكترونيك

Page 13: EBOOK - AMiner · School trip attraction modeling using neural & fuzzy-neural approaches . Russell s., norvig p. Artificial intelligence- a modern appr . Robust t-s fuzzy model-based

وب سايت خود را به يک مرکز درآمد تبديل کنيد نقش اطالع رساني الكترونيك در سواد سالمتي جوانان مقدمه ای بر ويروسھا و برنامه ھای مخرب مفاھيم پايه فناوري اطالعات مرجع ، مدل ھاي ذھني و فن آوري آموزش

ك علمي ايرانمديريت دانش و تحليل اطالعات در مركز اطالعات و مدار مديريت مجموعه در محيط الکترونيکی فناوري اطالعات در حوزه ھاي علميه با تأكيد بر اصطالح نامة جامع علوم اسالمي

افزايش ارتباطات و تاثير آنھا روي سيستم روابط صنعتي و مديريت منابع انساني,فن آوري اطالعات فارسي؛ مبتنی بر وب در كتابخانه منطقه اي علوم و تكنولوژيطراحی و پياد ه سازي نشريات الكترونيكي تمام متن

سازمان الکترونيک آموزش و پرورش رويكرد متفاوت به مالحظات امنيتي در ابتكارات آتابخانه ھاي ديجيتالي روشي براي رفع چالش ھاي محتواكاوي وب ھاي فارسي زبان روشھايی برای حفاظت از شبکه ھا

قسمت سوم_ رو در روي انواع ھكر قسمت دوم_ رو در روي انواع ھكر

قسمت چھارم_ رو در روي انواع ھكر ده اشتباه خطرناك در بازاريابي اينترنتي دسترسي به اطالعات يا ھرج و مرج يا ھر دو؟ انتخاب با شماست سرريز(buffer overflow)چيست ؟ توسعة فناوري اطالعات در دانشگاھھا و مؤسسات پژوھشي

مفاھيم شبكه ھاي كامپيوتريتندآموز تأثير اينترنت ارتقاي نقش كتابدار مرجع به آموزشگر پايگاھھاي اطالعاتي نشر كتاب ايران بيان ضرورت و معيارھاي ارزيابی در صفحات وب

!!!بانک تجارت چگونه ھک شد بازيافت ضايعات الكترونيكي

تصويري را ذخيره کرد؟_ آيا مي توان ميراث صوتي گام به گام ھكآموزش

ايجاد محيطي امن و جلوگيري از دسترسي غير مجاز به پست الكترونيك انتخاب شيوه گذر از فيلتر انتخاب الكترونيكي در دولت الكترونيك امنيت شبكه و فايروال استفاده ازوبالگ براي پيشبرد سوادآموزي دركالس استحکام امنيت بي سيمي

و معيارھاارزيابي كيفي وب سايت ھاابزارھا اجالسWork and teleworking Wireless hacking Web server hacking1 The methodology of web hacking Telnet hacking Takmile form shenasnameye fa'aaliyat pajooheshi Sub sevenآموزش برنامه Sql_injection 2 Sql_injection 1 Spoofing referer header Softwarspecialistswages Netcat Microsoft iis server hacking Lsasrv.dll rpc buffer overflow remote exploit Lopht hackers Learning_onspeed Kasbo kar bar bale andishe Ids journal Idle scan How to promote your web site effectively Honeypot Hack learning step-by-step Gr___it_security_handbook___840707 Googlebombs Filtering Farsi- hack book-2004-edition Exploit programming Emarketingway-ebook-01 Effective_web_design Cisco routers (white hat) Censorship Blaster worm Back doors Attack againt iis-2

url شمشير نفوزگران وب ٢ url شمشير نفوزگران وب ١

Page 14: EBOOK - AMiner · School trip attraction modeling using neural & fuzzy-neural approaches . Russell s., norvig p. Artificial intelligence- a modern appr . Robust t-s fuzzy model-based

١ or 2001 (remote pc desktop)راھي براي نفوز به سيستم

Linux English :

Red hat linux unleashed Teach yourself linux in 24 hours linuxمراحل نصب Wiley.red.hat.fedora.linux.secrets.oct.2005.ebook-ddu Wiley.linux.bible.2006.boot.up.to.fedora.knoppix.debian.suse.ubuntu.2006 Wiley,.red.hat.fedora.linux.2.all-in-one.desk.reference.for.dummies.(2004).ddu Wiley - java open source programming with xdoclet, junit, webwork, hibernate The state of embedded linux . . . Who, what, where, when, how Suse linux 9.0 - administrator handbuch Sams,.teach.yourself.red.hat.linux.fedora.in.24.hours.(2004).kb Sams linux socket programming by example Sams linux kernel development 2005 Rtlinux v3.0a posix 1003.13 pe51 os with a posix 1003.13 pe54 thread Reference.en Redhat press - red hat linux security and optimization Redhat press - red hat linux networking and system administration Redhat linux bible fedora and enterprise edition - wiley 2003 Redhat linux 9 security guide Redhat linux 9 - red hat linux reference guide Redhat linux 9 - getting started guide Redhat - the complete reference - enterprise linux and fedora edition (chm2pdf) - 2004 - mcgraw-h Red hat the complete reference enterprise linux and fedora O'reilly,.learning.red.hat.enterprise.linux.and.fedora.(2004).4ed.ddu.shareconnector Oreilly, understanding the linux kernel (2005), 3ed bbl lotb O'reilly, linux server security (2005), 2ed lib lotb O'reilly - linux security cookbook (2003) O'reilly - learning debian gnu linux O'reilly - building embedded linux systems O'reilly - alphabetical directory of linux commands Mcgraw-hill,.red.hat.the.complete.reference.enterprise.linux.and.fedora.edition.(2004) Linux_ip_networking Linux shell scripting tutorial v1.05r3 a beginner's handbook Linux kernel preemption Linux kde in 24 hours Linux days 2002,advanced tutorial Linux bible redhat Linux - open source web development with lamp using linux, apache, mysql, perl, and php Intro-linux Ebook - hack - linux hacker's guide Debian-faq.en Debian gnu-linux bible Apress,.open.source.messaging.application.development.building.and.extending.gaim.(2005).bbl.lotb Apress,.beginning.mapserver.open.source.gis.development.(2005).bbl Linux - internet firewalls and network security, second edition (new riders)

Farsi : آموزش لينوكس

متن باز_مقدمه اي بر نرم افزارھاي آزاد لينوكس چيست؟.فارسي نويسي در لينوكس exe ٩راھنماي كامل نصب لينوكس ردھت آموزش لينوكي براي مبتديان آشنايي مقدماتب با لينوكس در يك ساعتVfs نوکس برررسي ساختارھاي مورد استفاده در فايل سيستم مجازي لي Rpmمديريت بسته ھاي Red hat linux 7.3 the official red hat linux x86 installation guide Red hat linux 7.2 the official red hat linux x86 installation guide Mount fs in linux Migration2_bookformat Migration1_keshtkari_850403 Linux-kernel-compile-howto Linuxfilesystem Linux shell programming Linux history Gnu-linux-concepts Gnu gpl v3, farsi

Page 15: EBOOK - AMiner · School trip attraction modeling using neural & fuzzy-neural approaches . Russell s., norvig p. Artificial intelligence- a modern appr . Robust t-s fuzzy model-based

DVD 2 :

Magazines English :

Pc world magazine - january 2009 Pc world magazine - december 2008 Pc magazine - january 2009 Pc magazine - december 2008 Electronic gaming monthly magazine - november 2008 Electronic gaming monthly magazine - december 2008 Computer shopper magazine- january 2009 Computer shopper magazine - december 2008 Computer power user (cpu) - january 2009 Computer power user (cpu) - december 2008

Farsi : ٢مجله برنامه نويس شماره ١مجله برنامه نويس شماره

Mastering arc deluxe 2002 English :

Understanding_arcsde Managing_arcsde_services Getting_started_with_arcgis Editing_in_arcmap Config_tuning_guide_sqlserver Config_tuning_guide_oracle Building_a_geodatabase Using_arcgis_geostatistical_analyst Using_arcgis_3d_analyst Using_arccatalog Understanding_map_projections

Matlab English :

Signals and systems with matlab applications - orchard publications Science - engineering - using matlab 6 Reallyusefulebooks.net_158488911x_crc.press.a.guide.to.matlab.object.oriented.programming.may.200 Matlab getting started Matlab engineering programming Learn matlab 7.0 (matlab and simulink student version) Electronics and circuit analysis using matlab - crc press Digital signal processing using matlab v4.0 - proakis (218p) Cup a guide to matlab for beginners and experienced users Crc press - graphics and guis with matlab, 3rd ed - 2003 - (by laxxuss) Crc press - computational statistics handbook with matlab - 2002 - (by laxxuss) Chapman - advanced mathematics and mechanics applications using matlab, 3rd ed - 2003 - (by laxxu Applied numerical methods using matlab (yang 2005 wiley) (0471698334) - engineering - (ebook - pdf) - matlab programming

Maya English :

Maya ipr rendering 24 Maya fundementals Maya character animationFarsi :

Mhcip Farsi :

Mhcipconfigguide Mhcip installguide Mhcip installchecklist Mhcip guide

Mobile English :

Porting_simkin to symbian os Gprs white paper

Farsi : )صصی واژگان تخ( اصطالحات تلفن ھمراه

Page 16: EBOOK - AMiner · School trip attraction modeling using neural & fuzzy-neural approaches . Russell s., norvig p. Artificial intelligence- a modern appr . Robust t-s fuzzy model-based

Network operation center

Ms office English :

Microsoft access 97 quick reference Microsoft excel 97 quick reference Microsoft word 97 quick reference Word for power users Visual studio 2005 tools for office using c# and vb.net Power point 2000 exercises for beginners and skilled users Get going with word 2000 Get going with excel 95 Get going with excel 2000

Farsi : ٣آموزش ورد ٢آموزش ورد ١آموزش ورد آموزش اكسل wordاموزش power pointاموزش Word learning Pwerpointآموزش Learn frontpage 2000 Excel با آشنايي

نظريه زبانھاEnglish :

Hopcroft, motwani, ullman. Introduction to automata and alg Farsi :

آموزش نظريه زبانھا ترجمه ماشينیRegular expression Grammar classification Derivation Parsers Normal_grammars-chamsky-_greibash Finite_automata-nfa-landa Pushdown automata-continue Language machines(noorani) اصول ترجمه ماشينی فارسی به انگليسی

Network & internet English :

Building an intranet with windows nt 4 Cisco router handbook Client_server computing second edition Configuring cicso voice over ip Creating commercial web sites Curious about the internet High-performance-networking-unleashed How intranets work Intranets unleashed Learnning cpanel Microsoft exchange server survival guide Networking essentials Running a perfect intranet Teach yourself internet in 24 hours Teach yourself networking in 24 hours Teach yourself tcpip in 14 days Tricks of the internet gurus Andrew s[1]. Tanenbaum - computer networks 4th edition Artech house - gigabit ethernet - technology and applications - 2003 ! - by laxxuss Broadband access with xdsl technology Computer_networks_problem_solutions__4th_ed_2003__-_andrew_t E-mail with outlook express 5 Embedded ethernet and internet complete - jan axelson Ethernet network analysis and troubleshooting Gigabit ethernet, technology and applications (m.norris)(2003) artech house High performance switches and routers High-performance packet switching architectures Icmp

Page 17: EBOOK - AMiner · School trip attraction modeling using neural & fuzzy-neural approaches . Russell s., norvig p. Artificial intelligence- a modern appr . Robust t-s fuzzy model-based

Ieee 802.3-2002 - local and metropolitan area networks - csma-cd Internet control message protocol(icmp) John wiley & sons - ethernet networks. Design, implementation, operation, management. 4th edition Leon garcia, 1st edition, communications networks Make the most out of the internet Mcgraw-hill.professional.ethernet.passive.optical.networks.2005 Network programming for microsoft windows Network+ certification O'reilly - ethernet the definite guide - from the o'reilly anthology O'reilly - ethernet, the definitive guide Performance evaluation of control networks ethernet-controlnet-devicenet Professional ethernet in the first mile - mcgraw hill Tcpip tutorial and technical overview Wireless lan security solution motives and rationale Wireless network security 802.11, bluetooth and handheld devices

Farsi : Network learning Persian e-book about tcp-ip Ftp commands Internet_ebook.exe Internet-explorer_1 Microsofte internet information server attack Network_basics Networkdevicesguide Networkessential Semanticweb Tcpip cheatsheet v2.1 Tcp-ipعيب يابي در شبكه ھاي Vpnآشنايي با شبكه ھاي خصوصي مجازي Web_traditional_and_new_attack Webarchitectur-interview Weblogguide Webmatrixhostingنحوه ساخت يك پروفايل در Wlan بر فراز موتورھاي جستجو برخی کارکردھای آموزشی و پژوھشی وبالگھا

ان گيري در شبكهبھترين راه حل ھاي پشتيب تبليغ كارآمد وب سايت tcp-ipچيست كاربرد پروتكلmosدر تحريريه ھاي خبر سايت خود را در متورھاي جستجو ثبت كنيد سيستم شبكه ھاي كامپيوتري طريقه شبكه كردن دو رايانه به صورت مستقيم شبكه ھاي شھري(man) قسمت اول شبكه ھاي شھري(man) قسمت دوم

وكسي در شبكهكاربرد پر راه اندازي و تنظيم يك شبكهlanكوچك

اي مبتني بر استاندارد محصوالت شبكه ieee 802.11n مرجع شبكه ھاي كامپيوتري مسير يابي بدون سيم ، معرفي و قايسه شش روتر بي سيم نگاھي به چندapplication serverمطرح در جھان مفاھيم اوليه شبكه

ات فارسي از اينترنتمھارت در جستجوي اطالع next generation data centerنسل آينده مراكز داده نقش مسيرياب در شبكه ھا

OpenGL Farsi :

Opengl persian ebook

Operation system English :

Operating_system concept Operating_system swf modern operating systems 2nd ed by tanenbaum (prentice hall) [prentice hall] operating systems design and implementation, 3rd edition (2006) - bbl ]x].wiley & sons -(2006) modern multithreading Computer science - addison wesley - operating systems concurrent and distributed software design Design.and.implementation.of.the.4.4.bsd.operating.system.-.part.2 Distributed operating systems - tanenbaum Introduction to real-time operating systems Learn system commander

Page 18: EBOOK - AMiner · School trip attraction modeling using neural & fuzzy-neural approaches . Russell s., norvig p. Artificial intelligence- a modern appr . Robust t-s fuzzy model-based

Microsoft windows server 2003 vs. Linux competitive file server performance comparison Operating system concepts 7th ed - silberschatz galvin Prentice.hall.operating.systems.design.and.implementation Real time operation systems

Farsi : Aboutntfs20041020 Microsoft products activation

Parrallel processing English :

)١٩٩۴ ( pvm, a user's guide and tutorial for networked parallel computing (paper) johnson et.al parallel processing in computational stochastic dynamics ]linux] beowulf_cluster_computing_with_windows Beowulf_cluster_computing_with_windows Cambridge university press - parallel scientific computing in c++ and mpi Cantu-paz e efficient and accurate parallel genetic algorithms (kluwer,2000)(isbn 0792372212)(600 Chu and george et al - inside the fft black box- serial and parallel fast fourier transform algor Cluster computing - architectures, operating systems, parallel processing & programming languages Doctorat - economic-based distributed resource management and scheduling for grid computing Engineering.-.an.introduction.to.parallel.computing.2ed.(addison.wesley) Grid computing High performance linux clusters with oscar rocks openmosix and mpi (oreilly,2004) Information.science.publishing.designing.distributed.learning.environments.with.intelligent.softw Intro-linux John wiley & sons - grid computing John wiley & sons - parallel computing on heterogeneous clusters Kowalik j s (ed) parallel computation computers for artificial intelligence Linux-kongress_2003_openmosix Morgan kaufmann - sourcebook of parallel computing - 2003 !!! - (by laxxuss) Mpi_cluster_programming Open mp Openmosix-howto Parallel computing - mit press - mpi - the complete reference, volume 1 (ebook) Parallel computing - mpi_course Parallel computing technologies Parallel io for cluster computing Parallel processing, neural networks and genetic algorithms Parhami b. Introduction to parallel processing.. Algorithms and architectures (kluwer, 2002)(557s Prentice hall - algorithms for clustering data (jain dubes, 1988) Pvm-book Springer - grouping multidimensional data - recent advances in clustering - feb 2006 Springer 2005 distributed & parallel systems - cluster & grid computing Vmware and mscs. Build your own windows 2003 cluster v1.0 Wiley - tools and environments for parallel and distributed computing (2004) Wiley.parallel.computing.for.bioinformatics.and.computational.biology.ebook-spy

Farsi : Grid Grid2 Openmosix Seti@home openmosixابزاري براي توسعه كالسترھاي مبتني بر لينوكس

Peekabooty

Photoshop English :

Photoshop tutorial Teach yourself photoshop in 14 days

Farsi : Adobe photoshop 6.0مرجع ١آموزش نرم افزار فتوشاپ قسمت

Powerdesigner 9 English :

Whatsnew90 Whatsnew80 Weblogic6_techdoc Pdm_tutorial Pd8_0_1_update Oom_tutorial Migration

Page 19: EBOOK - AMiner · School trip attraction modeling using neural & fuzzy-neural approaches . Russell s., norvig p. Artificial intelligence- a modern appr . Robust t-s fuzzy model-based

Cocobase3_techdoc Cdm_tutorial Bpm_tutorial Advanced

Programming & data structers

English : Component writer's guide help Introduction mapi sapi and tapi developer's guide Microsoft press testing dot net Microsoft visual studio 2005 Vs 2008 Windows 98 and ntprograming unleashed ٧- porkolab

A locally optimal handoff algorithm Addison wesley - design pattern explained - a new perspective on object oriented design Better oop with collection classes Compiler techniques for determining data distribution and generating communication sets on distri Debug your code better faster Debug.txt Microsoft.press.debugging.applications.for.microsoft.dotnet.and.microsoft.windows Mit press - types and programming languages (ml, functional languages) - 2002 ! - (by laxxuss) Netframeworkessentials Object-oriented and classical software engineering, stephen r schach, 6th edition Object-oriented data structures using java 2002 Tiobe programming community index for november 2006 Variations on optimal and suboptimal handoff control for wireless communication systems

Farsi : Api function's guid (mfc)مدل برنامه نويسي ويندوز About-dotnet Active call center Java_vs_asp_net Pascal و cمقايسه برنامه نويسي Programming languages Why_we_need_to_dotnet آناليز صدا كتابخانه ھا مقايسه اجمالي روشھاي مختلف نمايه سازي ماشيني

Programming language Action script

English : Flash5 actionscript reference guide Fl_actionscript_reference Actionscriptdictionary Actionscript_cookbook.(flash).july2003.oreilly Actionscript 2004- newriders- flash mx 2004 - object oriented programming with actionscript 2.0

ADO & ADO.net English :

Professional ado.net 2 - programming with sql server 2005, oracle, and mysql (wrox, 2005) by tant A programmer's guide to ado.net in c# (ebook) c# pro ado net 2.0 - 2005

Farsi : Ado.net cookbook Ado.net 2005 farsi Ado.net 2005 farsi 2 Adoآموزش

Ajax Farsi :

Ajax learning ھمه چيز درباره آژاكس اصول تكنيك آژاكس

Asp & asp.net English :

A practical guide to asp Asp Basic with .net & iis for asp.net Microsoft asp dot net 2.0

Page 20: EBOOK - AMiner · School trip attraction modeling using neural & fuzzy-neural approaches . Russell s., norvig p. Artificial intelligence- a modern appr . Robust t-s fuzzy model-based

Wrox press professional asp.net 1.1 Wrox - beginning asp net 1.1 with visual c# net 2003 (2005) Wiley,.professional.web.parts.and.custom.controls.with.asp.net.2.0.(2006).ddu.ocr.7.0.lotb Programming active server pages Oreilly - programming asp.net Built-in asp objects reference Beginning asp.net 2.0 e-commerce in c# 2005 from novice to professional - apress Asp.net.unleashed.2nd.edition.ebook-lib Asp.net web developer's guide

Farsi : Advanced asp.net with sample Basics asp.net with sample Ways-to-avoid-attack Asp.net و aspبررسي و حل مشكالت فارسي نويسي در Asp.netمرجع Asp.net در sql-server ٢٠٠٠ آغاز به كار با Asp.netخطاھاي متداول ھنگام اجراي برنامه ھاي Asp.netحفظ حالت در

Assembly English :

Asm&c instruction help table Assembly language learning

Farsi : Windows asm programing reference

C & C++ & VC++ English :

٢۵۶color vga programming in c C++ by example Teach yourself c++ in 21 days The c++ programming language 3rd edition (stroustrap( Visual c++ 4 unleashed Visual c++ 6.0 learning ebook Visual c++ in 12 easy lessons Web database developer's guide with visual basic Wiley-interscience,.numerical simulations and case studies using visual c++.net.[2005.isbn0471694 Wiley,.ivor.hortons.beginning.visual.c++.2005.(2006).bbl Wiley - programming with objects. A comparative presentation of oop with c++ and java Wiley - microsoft visual studio.net c++ for dummies quick reference guide Wiley - c++ timesaving techniques for dummies (2006) Wiley - 2004 - c++ for dummies (fifth edition) Teach yourself visual c++ 6 in 24 hours Teach yourself object-oriented programming with visual c++ 1.5 in 21 days Programming - object-oriented analysis and design - c++ unleashed Programming - object-oriented analysis and design - c++ unleashed (1) Prentice hall - core c++ - a software engineering approach (1280 pages) - 2000 - (by laxxuss) Prentice hall - core c - a software engineering approach (1280 pages) - 2000 Object-oriented modeling, c++ programming and scripting Object_oriented_design_patterns_for_network_programming_in_c++.schmidt Moreeffectivec++ Foundations of algorithms using c++ pseudocode - jones and bartlett, 3rd ed - 2003 E-book - vc++ - learn visual c++ 6 Data structures and algorithms with object-oriented design patterns in c++ C++.wiley - a beginner's introduction to computer programming - you can do it! 2004 C++ programming - a practical introduction to object-oriented design with c++ Bjarne stroustrup - the c++ programming language 3rd ed (ppc) Teach yourself visual c++ 6 in 21 days Visual c++ 6 - the complete reference - mcgraw-hill Programing - learn visual c++ 6 Muller, peter - introduction to object-oriented programming using c++

Farsi : Cpp learning Cpp learning

C# English :

Microsoft visual c sharp 2005 Wrox - visual c# 2005 express edition starter kit Windows forms programming with c# Wiley, c sharp 2005 for dummies (2006) ling ocr 7.0 lotb Web programing com visual c# 2005 Visual studio 2005 tools for office using c# and vb.net Visual c# 2008 - step by step Visual c# 2005 - how to program, 2nd edition (2005)

Page 21: EBOOK - AMiner · School trip attraction modeling using neural & fuzzy-neural approaches . Russell s., norvig p. Artificial intelligence- a modern appr . Robust t-s fuzzy model-based

Programming microsoft visual c# 2005 - the language (ms press , 2006) Programming csharp, 4th edition (o'reilly) Programming c#, 2nd edition-jesse liberty Professional csharp 2005 (wrox press) Net framework 2.0 introduction visual c# 2005 Mspress-microsoft visual c# 2005 step by step (2006) Microsoft visual c# 2005 step-by-step (2005) Microsoft visual c# 2005 express edition - build a program now! Manual visual c# 3.0 and visual studio 2005 H.m.deitel, p.j.deitel - visual c# 2005 - how to program. 2nd edition. 2005 Csharp web development guide C# language C# developer's guide to asp net, xml, and ado net C# - o'reilly - visual c# 2005 - a developer's notebook - jesse liberty - 2005 C# - addison wesley - visual studio tools for office using c# with excel word outlook and infopat C# - addison wesley - gang of four - design patterns, elements of reusable object oriented softwa Beginning visual csharp 2005 (wrox press) Beginning visual c# 2005 , beginner to professional )en) programming microsoft visual c# 2005 - the language (ms press , 2006).rtf

Farsi : مقدمه اي بر سي شارپMultithread programming in visual c#.net Learnvisualc#farsi

C++ builder English :

C++builder unleashed

CGI English :

Cgi manual of style online Cgi programming unleashed Teach yourself cgi programming Teach yourself cgi programming with perl 5 in a week

Cold fusion mx English :

Getting started building coldfusion mx applications Coldfusion mx components a new methodology for building applications

Farsi : ايجادxmlاز محتواي يك پايگاه داده Flash remoting dynamic data using cf

CSS English :

Cascading style sheets, level 2 css2 specification

Delphi & pascal English :

Teach yourself borland delphi 4 in 21 days Teach_yourself_delphi_in_24_ho Mastering delphi 6 Internet programming with delphi Delphi 5.0 quick start Delphi 5.0 developer's guide Creating_wap

Farsi : Delphiآموزش فيلتر سازي تصوير در دلفي delphiچيست Pascal learning Dllنحوه نوشتن

Erlang English :

Thinking in erlang Getting_started with erlang 5.4 Erlang renewal models for genetic recombination Concurent programing in erlang

Forth English :

Thinking-forth Forth programming language

Game programming English :

Teach yourself internet game programming with java in 21 days

Page 22: EBOOK - AMiner · School trip attraction modeling using neural & fuzzy-neural approaches . Russell s., norvig p. Artificial intelligence- a modern appr . Robust t-s fuzzy model-based

Maya for games Beginning c# game programming (premier, 2005)

Farsi : ٣راھنماي استفاده از نرم dgamestudioافزار

ت بازي شويد؟آيا مي خواھيد كه وارد صنعت ساخ Make_game_2 Make_game

Java & java script English :

!Developing intranet applications with java !Developing professional java applets !Java developer's reference !Javascript manual of style !Presenting javabeans !Special edition using java script !Special edition using jscript Developing professional java applets Building java applet - sun javasoft course Java 1.1 unleashed Teach yourself java 1.1 programming in 24 hours Wrox - beginning java 2 jdk5 edition -2005 Tutorial - java applet programming techniques Oreilly.java.script.and.dhtml.cookbook.ebook-lib Neural nets with java - joone complete guide - 2004-04 - bookmarked Jdk 1.4 tutorial Javascript for begineers Java script bible 4th edition - hungry minds J2ee and xml development Developing professional java applets Creating web applets with java [java script] o'reilly - javascript the definitive guide 2ed [ebook-pdf] - java script bible - gold edition (ebook) - java applet programming unleashed

Farsi : Java learning نمونه كدھاي جاواJ2ee و javaآشنايي با

Microcontroller English :

Understanding electronics components Programming pic microcontrollers in basic Pic microcontrollers, for beginners too Mikrobasic_manual Introduction to plc controllers Basic compiler for microchip dspic microcontrollers_micro basic for dspic

Mobile programming English :

Professional symbian programming Wiley & sons - building pda databases for wireless and mobile development Symbian c++ Programming_of_mobile_phones_on_java_2_micro_edition-dmk_press_2004_-_gornakov_s_g_-_ Mobile net - - programming microsoft windows ce net (3rd) (2003) Mobile - cracking the code~wap, bluetooth, 3g programming (wiley 2002) [wiley] rapid mobile enterprise development for symbian os - an introduction to opl application d (mobile programming) the mobile communications handbook (mobile programming) programming games on symbian

Farsi : برنامه نويسي موبايلMobileمقدمه بر برنامه نويسي

Oberon English :

Projectoberon Activeoberonnetwhitepaper

Objective caml English :

Ocaml-3.09-refman Object caml

Open object rexx English :

Rexxpg

Page 23: EBOOK - AMiner · School trip attraction modeling using neural & fuzzy-neural approaches . Russell s., norvig p. Artificial intelligence- a modern appr . Robust t-s fuzzy model-based

Perl English :

Perl 5 unleashed Perl quick reference Perlbookshelf Programming perl 5.0 cgi web pages for microsoft windows nt Special edition using perl 5 for web programming Teach yourself perl 5 in 21 days Web programming with perl5

Php English :

Wrox press - professional php programming Wiley, php & mysql everyday apps for dummies (2005) ddu ocr 7.0-2.6 lotb Web development with php fasttemplate Using the google web apis with php Using php with java Php-mysql_tutorial Php_manual_en Php.and.mysql.for.dummies.-.second.edition.-.mar-2004 Php 5 and mysql bible - from the o'reilly anthology Php & mysql - sams,.php.and.mysql.web.development.(2005),.3ed.lotb Ebook sams php & mysql web development Sams - teach yourself php mysql and apache in 24 hours - 2003

Farsi : آشنايي با نصب و راه اندازيphpو موارد مربوطه Phpمعرفي Compelete persian php & mysql learn ebook (www.redterm.com)

Python English :

O'reilly python in a nutshellk

Ruby English :

Ruby 1.8 programming Farsi :

Ruby learning

Vb script English :

Teach yourself vbscript in 21 days Vbscript unleashed

Farsi : Vbscriptآموزش

VHDL English :

Vhdltest_us Vhdl language reference guide.hlp The vhdl cookbook

Visual basic English :

Database developer's guide with visual basic 4 second edition How to programming visual basic5 Microsoft visual basic 2005 Teach yourself database programming vb5 Teach yourself vb5 Teach_yourself_visual_basic_5_ Visual basic 4 unleashed Visual basic 6 toturial Web programming with visual basic Visual basic 2008 - recipes a problem-solution approach Visual basic 2008 - mastering Visual basic 2008 - in 24 hours complete starter kit Vb6 2 vb net tutorial Vb .net developer's guide Sams-a programmer’s introduction to visual basic.net Programming_visual_basic Programming visual basic 2008 - build .net 3.5 applications with microsoft's rad tool for business In_design patterns and object oriented programming in visual basic 6 and vb.net Apress.pro.asp.net.2.0.in.vb.2005.jan.2006 [vb2005] - beginning object-oriented programming with vb 2005 - from novice to professional [no starch press] the book of visual basic 2005 -.net insight for classic vb developers (2006) -

Farsi :

Page 24: EBOOK - AMiner · School trip attraction modeling using neural & fuzzy-neural approaches . Russell s., norvig p. Artificial intelligence- a modern appr . Robust t-s fuzzy model-based

Vb learning pack ١آموزش جزئي ويژوال بيسيك ٢آموزش جزئي ويژوال بيسيك كنترلھا شروع ويژوال بيسيك دستكاري تصاوير چند ريسماني در ويژوال بيسيك تبديل تاريخ سيستم از ميالدي به ھجري شمسي و يا بلعكس پخش فايلھاي صوتي و تصويري شبكه درvbبرنامه نويسي آموزش ويژوال بيسيك آشنايي با اكتيوايكس فالشVisualbasic6 in n+1 days Visual basic dotnet reference Vc و ++ vb رتباط سلایر كامپيوتر و ميكروكنترلر با استفاده از ا Vb.netكار با رجيستري ويندوز با استفاده از Vb.net به vb6مروري بر تغييرات از Vb.net functions Vb در ms-agentطريقه استفاده از كنترل Vb در c&c ھاي نوشته شده به زبان ++ dllطريقه استفاده از Vb در apiتوابع Vb (ر د registry طريقه استفاده از محضرخانه ويندوز) Vb با استفاده از shutdownآموزش

Visual interdev English :

Teach yourself microsoft visual interdev in 21 days

Rational rose & uml & oo English :

A practical guide to testing object-oriented software - addison-wesley - 2001 Object oriented analysis and design with applications 3rd.edition.may.2007.ebook-bbl Object-oriented software engineering - using uml, patterns and java Oop with microsoft vb net and c sharp Prentice hall - larman - applying uml and patterns- an introduction to object-oriented analysis a Reilly.-.head.first.object-oriented.design.and.analysis The visualization toolkit an object oriented approach to 3d graphics, 3rd edition - kitware inc Wiley object-oriented analysis and design understanding system development with uml 2.0 (2005) Wiley, object-oriented analysis & design (2005) bbl ocr 7.0-2.6 lotb

Farsi : Modeling with uml متدولوژي شيء گرائيRational roseآموزش مقدماتي Uml & oo Uml بوسيله mrpii-erpمدل سازي مفھومي Umlapplied Uml-rational rose موزش آ آموزش ھمراه با مثال نرم افزار رشنال رز

Robotic English :

Academic.press,.robotics.designing.the.mechanisms.(1999),.2ed.lrn.lotb Crc press - multi-agent robotic systems - 2001 Development of unmanned robotic vehicles based on teh three-wing planform technology Ebook.crc_press-statistics_for_environmental_engineers_second_edition.sharereactor Fu k.s.,gonzalez r.c.,lee c.s.g. - robotics- control, sensing, vision, and intelligence How to build your own nerd-cam 2 degree of freedom robotic camera with off the shelf parts by t n Introduction to robotics, mechanics and control, 2nd ed - john j craig, addison wesley Introduction to robotics, mechanics and control, 2nd ed - john j craig, addison wesley

Software engineering English :

A-list.publishing.code.optimization..effective.memory.usage Artech.house.a.practitioners.guide.to.software.test.design Artech.house.successful.evolution.of.software.systems Artech.house.systematic.process.improvement.using.iso.9001.2000.and.cmmi Artech.house.systematic.software.testing Artech.house.testing.and.quality.assurance.for.component.based.software Artech.house.the.requirements.engineering.handbook Aspatore.books.softwar E.agreements.line.by.line Aspatore.books.software.product.management

Page 25: EBOOK - AMiner · School trip attraction modeling using neural & fuzzy-neural approaches . Russell s., norvig p. Artificial intelligence- a modern appr . Robust t-s fuzzy model-based

Auerbach.publications.database.design.using.entity-relationship.diagrams Auerbach.publications.interpreting.the.cmmi.a.process.improvement.approach Auerbach.publications.the.laws.of.software.process Auerbach.publications.the.laws.of.software.process(lib( Biblio.distribution.c.plus.plus.for.artists Charles.river.media.applied.software.engineering.using.apache.jakarta.commons Charles.river.media.preventative.programming.techniques Cmp.books.designing.embedded.communications.software Crc.press.software.metrics..a.guide.to.planning,.analysis,.and.application Digital.press.managing.software.deliverables Idea.group.publishing.practicing.software.engineering.in.the.21st.century Management.concepts,inc..essentials.of.software.project.management Microsoft.press.debugging.applications Microsoft.press.debugging.the.development.process Microsoft.press.developing.international.software.second.edition Microsoft.press.international.programming.for.microsoft.windows Microsoft.press.software.project.survival.guide Mit.press.software.development.failures.anatomy.of.abandoned.projects Mit.press.software.ecosystem Morgan.kaufmann.observing.the.user.experience Ms.press.software.requirements.2nd.edition Prentice.hall.a.software.engineering.approach.to.labview Prentice.hall.ptr.agile.management.for.software.engineering Prentice.hall.ptr.software.architect.bootcamp,.second.edition Prentice.hall.ptr.software.by.numbers--low-risk,high-return.development Prentice.hall.ptr.the.practical.guide.to.enterprise.architecture Requirements management with use cases, rational, software engineering(1( Sams.object-oriented.thought.process,the.(2nd.edition( Software engineering - sommerville Software engineering, 6th edition (sommerville, 2000( Sybex.pmp.project.management.professional.workbook Wiley,.essentials.of.research.design.and.methodology.(2005).ling.lotb Software engineering - advanced project management a complete guide to the key processes models 2 Software engineering - a practitioners approach - pressman - 5th ed - 2001 Research methods in engineering and science Research methods in cs Object-oriented software engineering Component-based software engineering state of the art #249 Addison wesley - analysis patterns, reusable object models (object-oriented software engineering2 A clientserver case study for software engineering students [software engineering] [addison wesley] [pdf] managing software requirements second editio

Farsi : نياز سنجي اطالعات

چارچوب فرايند توليد سيستم ھاي نرم افزاري_ پي .يو.مرجع معرفي آر rupچيست رفتار سازمانی چيست؟Se- reverse software engineering help & support

Unix English :

Teach yourself linux in 24 hours Unix unleashed Unix system programming - ii Unix system programming - i Unix network programming with tcp-ip Teach yourself unix in 24 hours

Farsi : يونيكس چيست(unix) عامل يونيکس مجموعه مقاالتی در مورد سيستم Viewworks

Web design English :

!Web programming desktop reference !Web programming unleashed !Web scripting secret weapons !Windows nt4 web development Creating commercial web sites How to use html How to use html 3.2 Html the definitive guide Inside dynamic html & sample souce code

Page 26: EBOOK - AMiner · School trip attraction modeling using neural & fuzzy-neural approaches . Russell s., norvig p. Artificial intelligence- a modern appr . Robust t-s fuzzy model-based

Internet learning in 24 hours Learn html Teach yourself html 3.2 in 24 hours Teach yourself web publishing The complete idiot's guide to creating an html web page Web master expert solutions Web publishing professional reference edition Wrox - beginning php5, apache and mysql web development (2005) Ms press - building web solutions with asp.net and ado.net Learn html 4.0 Html 4.0 specification Get going with homepages Designing web animation

Farsi : Html learning

چگونه گي نمايش فيلم بروشstreaming اينترنت روي domچيست xmlچيست و چرا دارای اھميت فراوان است ؟ جزوه آموزشي مباني مھندسي اينترنت آموزش متدولوژی و تکنولوژی طراحی وبXmlincsharp Http compressionاستفاده از تكنيك Html learning Html learning reference

Windows English :

Microsoft ipsec (video( Microsoft windows 2000 server resource kit Peter norton's complete guide Peter norton's maximizing windows 98 administration Win98 book Windows 98 tutorial Windows nt 4 server unleashed Windows nt95 registry Windowsxp in pictures (reference) Windows server 2003 - the complete reference (2003) Windows server 2003 - domains active directory Windows server 2003 - dhcp server configuration.avi Windows 2000 exercises Wiley.windows.server.2003.bible.r2.and.sp1.edition.mar.2006 Vpn_userguide windows 2003 server Technet webcast- windows server 2003 administration series (part 10 of 12)- vpn-ras (level 200).wmv Speed it up! With the registry windows-tuning Ms press 2003, windows server 2003 network infrastructure training kit (70-291) Microsoft windows 200o professional quick refrence card Installing_usb_drivers Hacking windows xp Configuring and troubleshooting windows xp professional Microsoft windows small business server 2003 installation, administration, configur

Farsi : Registry learning Windows xp setup simulation نمايش متن و پيغامي براي كاربران ھنگام شروع ويندوز مديريت ويندوز ايكس پي از راه دور كسب اطالع از سخت افزار نصب شده رجيستري چيست؟ راھنماي ويندوز ملنيوم دستكاري در رجيستري ترميم رجيستري

٩٨آموزش ويندوز وز ايكس پيآموزش تصويري نصب ويند

ھاي آشنايي با زيرساخت active directory در windows server 2003 از ھر كجاي دنيا به كامپيوتر خود دسترسي پيدا كنيدXpآموزش نصب ويندوز Ntfsسيستم فايل Commandآموزش دستورات (windows 2000 terminal service)ميز كاري در دوردست (system management server) smsآشنايي با قابليتھاي

Wise installer Farsi :

Page 27: EBOOK - AMiner · School trip attraction modeling using neural & fuzzy-neural approaches . Russell s., norvig p. Artificial intelligence- a modern appr . Robust t-s fuzzy model-based

Wise installer با استفاده از setupراھنماي سريع ساخت Wise installer learning