Protected Textbooks


e would like to present you protected e-textbooks. The technology of producing such textbooks combines HTML, FLASH, graphics, avatar technology, presentation, video files in any format, audio files, etc.

The textbook is manufactured in the form of EXE program file. When downloaded to a student’s computer, the textbook begins installation like ordinary software.

When you first open a textbook, it requires personal activation, i.e. connecting to the E-University server through the Internet, and entering a unique code, which the student receives in your university’s EMD. Herewith, the textbook registered on one computer can’t be installed on any other one or transferred or copied to any external electronic media.

The so-called "Library Function" is built into the program shell of the textbook, i.e. E-University server requires the textbook to go online at a certain time interval to check the activity period of the textbook on a student’s computer. Once the period of using a textbook has expired, the server automatically blocks the opening of a textbook on a student’s computer. If a student doesn’t allow the textbook to connect to the E-University server, there’s a function initially available on the set up on the textbook to deactivate it in case it failed to get in touch with the E-University server longer than allowed.

The textbook doesn’t allow the student to copy educational material on the computer, as well as printing it, and blocks the functions «Copy&Paste»,«Drag&Drop» and «Print Screen».

Besides all mentioned above, a large number of extra parameters can be set when creating the textbook – from the insertion of advertising graphics and text blocks at the opening and closing of the textbook to the password protection of its individual pages and setting time limits for access to specific pages, or receiving e-mail notifications about users of your textbooks according to the specified parameters (name, email address, postal address, organization, phone, etc.) and other parameters.

At customer’s option textbooks may be not password protected or have fixed passwords in unlimited quantities.

If you already have ready e-textbooks, we can protect them with our program shell.



Opportunities provided when creating textbooks:  

 Using the HTML layout
 Using DNL layout
 Using text materials with graphics and tables
 Combined layout of pages
 Using Flash animation
 Using simulation elements: this technology allows imitating the user’s work with any software product (either with or without voiced accompaniment)
 Using video files
 Using Avatar animation 
 Using tests
 Using voiced accompaniment on pages
 Using elements of Avatar presentation
 Using elements of flash presentation
 Using file attachments in various formats (Word, Excel, PDF, etc.)

 The use of content in other formats of your textbooks is only limited by your imagination; please order, and we’ll try to use them, too.

Using Avatars in e-textbooks

Consider the examples of using Avatar animation to create interactive training courses and e-textbooks.

First of all, let’s consider a sketchy scheme of creating an Avatar – electronic representative of a human.

 Choosing a photo.
 Creating an Avatar – an electronic image of the photo, expressing the human facial expressions and able to speak.
 Writing the electronic message for playback and combining it with an Avatar.
 The result is an Avatar – an electronic representative of a human.


Here’s a picture of a person  Here’s person’s Avatar


Impressive, isn’t it?!

We produce any number of Avatars based on professors’ photo on the university’s option, record and digitize any number of lecture materials, and integrate ready professors’ Avatars onto the pages of e-textbooks at the E-University. 


learning platform

Safe and without hesitation

Use E-University and don't worry about the safety of your system or your privacy.

learning management system



E-University features industrial strength high-security. All communication is secured by digital certificated issued by a trust center authority. The data is encrypted using modern state-of-the-art AES-256 encryption and 2048-bit secured key exchange.


 Encryption: 256-bit AES encryption (actual encryption algorithm may vary depending on browser capabilities).
 Digital Certificate, Public Key Infrastructure: 2048-Bit Certificate.