Amfas Tech | Technology, Blogging & Internet Marketing: EBooks

Ankit Fadia’s Hacking all-in-one pack

Ankit Fadia is Self proclaimed prodigy and ethical hacker. He calls himself a security expert. But Ankit Fadia is like many charlatans who gets published in one article and rides the wave of not only poor journalism but also his own hype.

For years, he has been quoted in low end online publications in India (his home country). Each time he is referenced as an 'expert' despite having no skills or accomplishments other than being quoted in these articles. No teenager has worldly experience that would qualify them as "knowledgeable" about an industry, let alone "expert". He certainly isn't worth the $15,001 - $25,000 fee per speaking engagement, peddling ten year old Windows novelty tricks called "hacks".
Download all eBooks on hacking from the following link directly. 

Continue Reading

Decision Support Systems for Business Intelligence

Computer-based systems known as decision support systems (DSS) play a vital role in helping professionals across various fields of practice understand what information is needed, when it is needed, and in what form in order to make smart and valuable business decisions. Providing a unique combination of theory, applications, and technology, Decision Support Systems for Business Intelligence, Second Edition supplies readers with the hands-on approach that is needed to understand the implications of theory to DSS design as well as the skills needed to construct a DSS.

Continue Reading

Distributed Computing: Principles, Algorithms, and Systems

Distributed Computing: Principles, Algorithms, and Systems

Book Details 

Hardcover: 754 pages 
Publisher: Cambridge University Press; 1 edition (May 19, 2008) 
Language: English 
ISBN-10: 0521876346 
ISBN-13: 978-0521876346 

File Size: 6.2 MiB 
Hits: 2,619 times

Continue Reading

Software Project Management by Walker Royce-JNTU Recomended

Continue Reading


Every professional and commercial software development organisation spends a great deal of time in the testing and validation of their software. The testing process, driven either by legal or financial requirements, can be expensive and may thwart the planned deployment of the application. Many studies indicate that the testing process can even take three times as long as the actual coding itself. Indeed, software development done under the ISO 9000 or FDA auspices can be extremely time intensive.

This book gives a lengthy and fairly comprehensive overview of software testing that emphasizes formal models for testing. In the introduction, the author gives a general overview of the testing process and the reasons and goals for testing. He carefully distinguishes between testing and debugging, and advocates these as separate activities. Testing according to the author is done to find bugs; whereas debugging is done to find the origin of the bugs and fix them. The author characterizes testing as either functional or structural. Functional testing treats the program from the user's point of view, with inputs given to the program, and then the outputs are checked for conformance to a specified reference. Structural testing examines how the program is implemented, in terms of programming style, design, etc. The notion of an oracle is defined as any program or process that specifies the expected outcome of a collection of tests. The author clearly identifies and characterizes the different types of tests that arise in development organizations, such as unit testing, regression testing, stress testing, and integration testing.

Table of Contents:

Introduction : Purpose of testing, Dichotomies, model for testing, consequences of bugs, taxonomy of

Flow graphs and Path testing : Basics concepts of path testing, predicates, path predicates and achievable paths, path sensitizing, path instrumentation, application of path testing.

Transaction Flow Testing : Transaction flows, transaction flow testing techniques. Dataflow testing:- Basics of dataflow testing, strategies in dataflow testing, application of dataflow testing.

Domain Testing:-domains and paths, Nice & ugly domains, domain testing, domains and interfaces testing, domain and interface testing, domains and testability.

Paths, Path products and Regular expressions : Path products & path expression, reduction procedure, applications, regular expressions & flow anomaly detection.

Logic Based Testing : Overview, decision tables, path expressions, kv charts, specifications.

State, State Graphs and Transition testing : State graphs, good & bad state graphs, state testing, Testability tips.

Graph Matrices and Application : Motivational overview, matrix of graph, relations, power of a matrix, node reduction algorithm, building tools.

Usage of JMeter and Winrunner tools for functional / Regression testing, creation of test script for unattended testing, synchronization of test case, Rapid testing, Performance testing of a data base application and HTTP connection for website access.

Continue Reading

Software Engineering,A practitioner’s Approach Roger S. Pressman

Continue Reading

Programming languages by Watt

Continue Reading

Concepts of Programming Languages by Robert .W. Sebesta

Continue Reading

Windows 7 Tweaks: A Comprehensive Guide on Customising, Increasing Performance, and Securing Microsoft Windows 7

Windows 7 Tweaks Ebook + Mediafire Link
If you're like most people, you want your Windows computer to go faster... to boost your productivity... to protect your privacy... and of course keep you safe both online and offline. But Windows doesn't always make it easy to achieve those goals.
Sometimes your computer runs slow, locks up or restarts for no apparent reason. It might be infected with viruses, spyware, or rogue toolbars. Maybe you're getting strange error messages when you turn on the computer, or try to run your favorite software.
If you've ever been frustrated by Windows problems, I recommend that you read my new ebook:

Definitive Guide to unlock the hidden potential of Windows 7 OS Written by bestselling author and creator Steve Sinchak, this unique guide provides you with the ultimate collection hidden gems that will allow you to get the most out of Windows 7. Bestselling author and creator show you how to tweak, modify, adapt, and take full control of the new Windows 7 operating system to open a hidden gem to optimize performance, speed, usability, and security of Windows 7 OS Shows you how to adjust boot screen and login, outrageous speed of your network and online, to get rid of features that drive you crazy, fine tune the User Account Protection, and much more So, roll up your sleeves and remove your gloves so you can take total control of more than 7 Windows OS!

You'll find chapters dealing with performance, security, customization, and troubleshooting.
Free downloads and system tools to detect and repair common problems.
If you're happy with XP, you'll learn how to batten down the hatches and keep it running over the long haul.
If you're looking for help with the transition to Windows 7, you'll find advice on upgrading, moving your files, making sure your old software works on the new system, and how to take full advantage of all the new features that Windows 7 offers. 

Continue Reading

Downlaod W3 Schools Website with all Content for Offline Study or Reference

Ever wonder to download a website and read it online. How it would be if it is, where we can learn web development or coding. That's too offline! excited? Download the website yourself and fell your self proud for having the ultimate guide to web development.

         Download Here

Continue Reading

Advanced Perl Programming 2nd Edition By Simon Cozens

Table of Contents 

Chapter 1.  Advanced Techniques

Chapter 2.  Parsing Techniques

Chapter 3.  Templating Tools

Chapter 4.  Objects, Databases, and Applications

Chapter 5.  Natural Language Tools

Chapter 6.  Perl and Unicode

Chapter 7.  POE

Chapter 8.  Testing

Chapter 9.  Inline Extensions

Chapter 10.  Fun with Perl

Continue Reading

802.11 WLANs and IP Networking Security, QoS, and Mobility Anand R. Prasad Neeli R. Prasad

Table of Contents 

Chapter 1 Introduction

Chapter 2 Market and Business Cases 

Chapter 3 IEEE 802.11 

Chapter 4 Security

Chapter 5 Quality of Service

Chapter 6 Roaming, Handover and Mobility

Chapter 7 WLAN Deployment and Mobile Integration

Chapter 8 Future Generation Communications

Continue Reading

Computer Networks, Fourth Edition By Andrew S. Tanenbaum

Table of Contents 
Chapter 1. Introduction

Chapter 2. The Physical Layer

Chapter 3. The Data Link Layer

Chapter 4. The Medium Access Control Sublayer

Chapter 5. The Network Layer

Chapter 6. The Transport Layer

Chapter 7. The Application Layer

Chapter 8. Network Security

Chapter 9. Reading List and Bibliography

Continue Reading

Learn HTML and CSS with W3 Schools Hege Refsnes, Stale Refsnes, Jan Egil Refsnes

Table of Contents 

Section I: HTML Basic
    Chapter 1: HTML Getting Started
      Chapter 2: HTML Fundamentals
          Chapter 3: HTML Elements
              Chapter 4: HTML Attributes
                  Chapter 5: HTML Headings, Rules, & Comments
                      Chapter 6: HTML Paragraphs
                          Chapter 7: HTML Text Formatting
                              Chapter 8: HTML Styles
                                  Chapter 9: HTML Links
                                      Chapter 10: HTML Images
                                          Chapter 11: HTML Tables
                                              Chapter 12: HTML Lists
                                                  Chapter 13: HTML Forms & Input
                                                      Chapter 14: HTML Color
                                                          Chapter 15: HTML 4.01 Quick List

                                                          Section II: HTML/CSS Advanced

                                                          Chapter 16: HTML Layout
                                                            Chapter 17: HTML Frames
                                                                Chapter 18: HTML Fonts
                                                                    Chapter 19: Why Use HTML 4.0?
                                                                        Chapter 20: HTML CSS Styles
                                                                            Chapter 21: HTML Character Entities
                                                                                Chapter 22: HTML Head & Meta Elements
                                                                                    Chapter 23: HTML Uniform Resource Locators
                                                                                        Chapter 24: HTML Scripts
                                                                                            Chapter 25: HTML Standard Attributes
                                                                                                Chapter 26: HTML Event Attributes
                                                                                                    Chapter 27: HTML URL Encoding
                                                                                                        Chapter 28: Turn Your PC Into a Web Server
                                                                                                            Chapter 29: HTML and CSS Summary

                                                                                                            Continue Reading

                                                                                                            Cryptography and Network Security Principles and Practices, Fourth Edition By William Stallings

                                                                                                            Table of Contents

                                                                                                            Part One: Symmetric Ciphers

                                                                                                            • Chapter 1. Introduction
                                                                                                            • Chapter 2. Classical Encryption Techniques 
                                                                                                            • Chapter 3. Block Ciphers and the Data Encryption Standard
                                                                                                            • Chapter 4. Finite Fields
                                                                                                            • Chapter 5. Advanced Encryption Standard
                                                                                                            • Chapter 6. More on Symmetric Ciphers
                                                                                                            • Chapter 7. Confidentiality Using Symmetric Encryption

                                                                                                            Part Two: Public-Key Encryption and Hash Functions

                                                                                                            • Chapter 8. Introduction to Number Theory
                                                                                                            • Chapter 9. Public-Key Cryptography and RSA
                                                                                                            • Chapter 10. Key Management; Other Public-Key Cryptosystems
                                                                                                            • Chapter 11. Message Authentication and Hash Functions
                                                                                                            • Chapter 12. Hash and MAC Algorithms
                                                                                                            • Chapter 13. Digital Signatures and Authentication Protocols

                                                                                                            Part Three: Network Security Applications

                                                                                                            • Chapter 14. Authentication Applications
                                                                                                            • Chapter 15. Electronic Mail Security
                                                                                                            • Chapter 16. IP Security
                                                                                                            • Chapter 17. Web Security

                                                                                                            Part Four: System Security

                                                                                                            • Chapter 18. Intruders 
                                                                                                            • Chapter 19. Malicious Software
                                                                                                            • Chapter 20. Firewalls

                                                                                                            Continue Reading

                                                                                                            Expert C Programming: Deep C Secrets By Peter van der Linden

                                                                                                            Continue Reading