You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The Mac OS X 10.3 Panther Little Black Book features the best techniques to help intermediate and experienced Mac users get the most out of the new Panther operating system. Previous editions of this book have enjoyed an excellent reputation with customers by helping Mac users solve problems, perform critical tasks, and maximize their use of OS X. In this new edition, the author uncovers more of the powerful features of Panther and shows readers, step-by-step, how to save hours of time. Key techniques covered in the book include how to deal with Mac OS X viruses, how to better manage fonts with Font Book, FontAgent Pro, and MasterJuggler, how to use new AppleScript features to automate tasks, how to use new system preferences to customize OS X, how to use the enhanced email features, how to setup OS X to support multiple users, and numerous other practical techniques. Hundreds of immediate solutions to everyday problems are provided, all clearly explained and tested.
Using this handy reference, you will quickly learn how to take advantage of Windows XP's new hardware and software support features. It is ideal for the corporate user who wants to migrate to Windows XP and use it daily. Written in a solutions-oriented format, the book focuses on configuring, connecting and networking, using, optimizing, and troubleshooting Windows XP Professional.
Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. Get the job done and learn as you go. A how-To book with practical recipes accompanied with rich screenshots for easy comprehension.This book follows the Packt How-to approach, offering an informative yet practical guide that is easy to understand. The book takes a meticulous approach to providing quick and simple recipe-based solutions for security and deployment of iOS devices."Instant Apple iOS Configurator Utility How-to" book is ideal for anyone with a working knowledge in iOS device deployment and management. It is likely you will be responsible for the maintenance and security of iOS devices, ranging anywhere from 10 to 10,000. This is the ultimate guide to iOS security management and device deployment.
Explains how to write code and discusses topics including Web servers, databases, polymorphism, and the Java Virtual Machine.
This book is known as the bible that points out security holes in the Windows 2000 system, as well as weaknesses that emerge from poor planning and lax administration. It places extra emphasis on Windows 2000 security issues raised by high-bandwidth connections to the Internet, with and without firewalls. It also covers Windows 2000 security at system deployment and at upgrade time, as well as during routine system administration. It organizes the Windows 2000 security topic functionally, according to tasks a system administrator would be called to perform.
With this concise, problem-solving guide, networking professionals will learn how to identify network security threat implement uniform security throughout their networks, secure remote dial-in access with CiscoSecure ACS and Cisco IOS AAA features, protect Internet access on their perimeter routers with the CiscoSecure IOS firewall software, and implement secure VPNs using IPSec and Cisco Encryption Technology. Step-by-step instructions and immediate solutions will help administrators implement and update security defenses. Every configuration in this book has been completely tested and perfected with actual Cisco routers.
The world moves on Critical Information Infrastructures, and their resilience and protection is of vital importance. Starting with some basic definitions and assumptions on the topic, this book goes on to explore various aspects of Critical Infrastructures throughout the world – including the technological, political, economic, strategic and defensive. This book will be of interest to the CEO and Academic alike as they grapple with how to prepare Critical Information Infrastructures for new challenges.
Discusses the essential elements in creating a successful game, how playing games and learning are connected, and what makes a game boring or fun.
Mark Bell, best-selling author of the Mac OS X Book, brings readers a guide to making the most of this latest operating system version via tips on the basics, applications, networking, Internet tools and utilities, power use and customization, troubleshooting, and searching capabilities. The book covers crucial feature upgrades including iChat, Sherlock3, Rendezvous, Quartz Extreme, and QuickTime 6, and lists Web resources.
A common misconception in the Mac community is that the Mac is more secure than other operating systems. While this might be true in many cases, the fact that people actually use the computers is often not considered in this analysis. When sharing is enabled or remote control applications are installed, then a variety of security threats are established. This book enables users of the Mac to enable services while not sacrificing the security of their systems.