Browse Results

Showing 53,276 through 53,300 of 53,657 results

XSLT Cookbook, 2nd Edition

by Sal Mangano

Forget those funky robot toys that were all the rage in the '80s, XSLT (Extensible Stylesheet Transformations) is the ultimate transformer. This powerful language is expert at transforming XML documents into PDF files, HTML documents, JPEG files--virtually anything your heart desires. As useful as XSLT is, though, most people have a difficult time learning its many peculiarities. And now Version 2.0, while elegant and powerful, has only added to the confusion. XSLT Cookbook, Second Edition wants to set the record straight. It helps you sharpen your programming skills and overall understanding of XSLT through a collection of detailed recipes. Each recipe breaks down a specific problem into manageable chunks, giving you an easy-to-grasp roadmap for integrating XSLT with your data and applications. No other XSLT book around employs this practical problem-solution-discussion format. In addition to offering code recipes for solving everyday problems with XSLT 1.0, this new edition shows you how to leverage the improvements found in XSLT 2.0, such as how to simplify the string manipulation and date/time conversion processes. The book also covers XPath 2.0, a critical companion standard, as well as topics ranging from basic transformations to complex sorting and linking. It even explores extension functions on a variety of different XSLT processors and shows ways to combine multiple documents using XSLT. Code examples add a real-world dimension to each technique. Whether you're just starting out in XSLT or looking for advanced techniques, you'll find the level of information you need in XSLT Cookbook, Second Edition .

Wireless Hacks, 2nd Edition

by Rob Flickenger Roger Weeks

The popularity of wireless networking has grown exponentially over the past few years, despite a general downward trend in the telecommunications industry. More and more computers and users worldwide communicate via radio waves every day, cutting the tethers of the cabled network both at home and at work. Wireless technology changes not only the way we talk to our devices, but also what we ask them to do. With greater flexibility, broader range, and increased mobility, wireless networks let us live, work, and think differently. Wireless networks also open up a vast range of tasty new hack possibilities, from fine-tuning network frequencies to hot-rodding handhelds. The second edition of Wireless Hacks , co-authored by Rob Flickenger and Roger Weeks, brings readers more of the practical tips and tricks that made the first edition a runaway hit, selling nearly 30,000 copies. Completely revised and updated, this version includes over 30 brand new hacks, major overhauls of over 30 more, and timely adjustments and touchups to dozens of other hacks introduced in the first edition. From passive network scanning to aligning long-distance antennas, beefing up wireless network security, and beyond, Wireless Hacks answers real-life networking needs with direct solutions. Flickenger and Weeks both have extensive experience in systems and network administration, and share a passion for making wireless more broadly available. The authors include detailed coverage for important new changes in specifications and in hardware and software, and they delve deep into cellular and Bluetooth technologies. Whether you need your wireless network to extend to the edge of your desk, fit into your backpack, or cross county lines, the proven techniques in Wireless Hacks will show you how to get the coverage and functionality you're looking for.

Windows XP for Starters: The Missing Manual

by David Pogue

Windows XP powers millions of PCs and is without a doubt the most widely used operating system in the world today. This rock solid operating system offers dozens of features for consumers, plus powerful applications and integrated networking tools all blended into an elegant interface. But working your way through all of these features and applications can be complicated. Whether you use this software at home or at work, sometimes you just want to learn the most commonly used features, not every option and nuance. For anyone interested in zeroing in and learning just the information they need without all the complicated jargon, Windows XP for Starters: The Missing Manual provides just the solution. Author David Pogue delivers an accessible and much needed guide with his trademark humor and friendly style. Windows XP for Starters: The Missing Manual provides clear explanations, with easy-to-follow, step-by-step instructions, and plenty of illustrations that make for a refreshingly simple approach to XP. Far more than a skimpy introduction but much less daunting than a weighty tech book, Windows XP For Starters: The Missing Manual unveils easy tips and tricks for making the most of the XP experience. Whether you're a first-time user who just wants the basics, or an experienced user who simply needs a quick overview, our new Windows XP For Starters: The Missing Manual is designed from the ground up to save you time and deliver what you need to know. Find out why this book is exactly what you need.

Linux Unwired

by Edd Dumbill Brian Jepson Roger Weeks

In Linux Unwired , you'll learn the basics of wireless computing, from the reasons why you'd want to go wireless in the first place, to setting up your wireless network or accessing wireless data services on the road. The book provides a complete introduction to all the wireless technologies supported by Linux. You'll learn how to install and configure a variety of wireless technologies to fit different scenarios, including an office or home network and for use on the road. You'll also learn how to get Wi-Fi running on a laptop, how to use Linux to create your own access point, and how to deal with cellular networks, Bluetooth, and Infrared. Other topics covered in the book include: Connecting to wireless hotspots Cellular data plans you can use with Linux Wireless security, including WPA and 802.1x Finding and mapping Wi-Fi networks with kismet and gpsd Connecting Linux to your Palm or Pocket PC Sending text messages and faxes from Linux through your cellular phone Linux Unwired is a one-stop wireless information source for on-the-go Linux users. Whether you're considering Wi-Fi as a supplement or alternative to cable and DSL, using Bluetooth to network devices in your home or office,or want to use cellular data plans for access to data nearly everywhere, this book will show you the full-spectrum view of wireless capabilities of Linux, and how to take advantage of them.

Java Enterprise in a Nutshell, 3rd Edition

by William Crawford Jim Farley

Nothing is as constant as change, and this is as true in enterprise computing as anywhere else. With the recent release of Java 2 Enterprise Edition 1.4, developers are being called on to add even greater, more complex levels of interconnectivity to their applications. To do this, Java developers today need a clear understanding of how to apply the new APIs, use the latest open source Java tools, and learn the capabilities and pitfalls in Java 2 Enterprise Edition 1.4 -- so they can plan a technology and implementation strategy for new enterprise projects. Fortunately, this is exactly what they get with the new Java Enterprise in a Nutshell , 3rd Edition. Because most integrated development environments (IDE) today include API lookup, we took out the main API sections from our previous edition to make room for new chapters, among others, on Ant, Cactus, Hibernate, Jakarta Struts, JUnit, security, XDoclet, and XML/JAXP. Revised and updated for the new 1.4 version of Sun Microsystems Java Enterprise Edition software, Java Enterprise in a Nutshell , 3rd Edition is a practical guide for enterprise Java developers.

Digital Audio Essentials

by Bruce Fries Marty Fries

Join the digital audio revolution! Tens of millions of users are embracing digital music, and with Digital Audio Essentials , you can, too. Nearly every personal computer built in the last few years contains a CD-burning drive; MP3 and other portable player sales dominate the consumer electronics industry; and new networkable stereo equipment lets you use your digital music collection to power your home entertainment system. Whether it's downloading music, ripping CDs, organizing, finding, and creating higher quality music files, buying music players and accessories, or constructing a home stereo system, Digital Audio Essentials helps you do get it done. An indispensable reference for music enthusiasts, digital archivists, amateur musicians, and anyone who likes a good groove, Digital Audio Essentials helps you avoid time-consuming, costly trial and error in downloading audio files, burning CDs, converting analog music to digital form, publishing music to and streaming from the Web, setting up home stereo configurations, and creating your own MP3 and other audio files. The book--for both Mac and PC users--includes reliable hardware and software recommendations, tutorials, resources, and file sharing, and it even explains the basics of the DMCA and intellectual property law. You may (or may not) already know the basics of ripping CDs or downloading music, but Fries will show you so much more--including advice on the multitude of MP3 players on the market, stereo options, file formats, quality determinations, and the legalities of it all. Both a timely, entertaining guide and an enduring reference, this is the digital audio handbook you need to make the most of your expanding digital music collection.

Teleportation: The Impossible Leap

by David Darling

An examination of developments in quantum physics which suggest that some form of matter transmission may be possible in the future.

Building the Perfect PC

by Robert Bruce Thompson Barbara Fritchman Thompson

With off-the-shelf computer systems to fit any budget or requirement, some people might wonder why you'd want to build your own. They don't understand that for many computer users, a ready-made system is about as satisfying as popping a frozen dinner in the microwave when you you'd rather have real food instead. Sure, it works, but it's not exactly what you need or want. There's a lot to be said for a computer that has exactly the quality components you choose, by the manufacturers you choose, rather than the conveniently bundled assortment made for your price point. But perhaps you've stopped short of building your own because you're inexperienced or you're concerned it won't come out right. After all, you want your computer to be perfect. Hesitate no longer: Building the Perfect PC delivers end-to-end instructions (that even inexperienced PC-builders can follow) for creating your ideal machine. Written by hardware experts Robert Bruce Thompson and Barbara Fritchman Thompson, this book covers it all, beginning with the various reasons why you'd want to build your own PC, planning and picking out the components, and putting it all together. The book outlines a variety of complete systems and all of their components, including a small form factor PC; a middle-of-the-road "sweet spot" system with top-notch components; and a top-end gaming PC with high-end video, a fast processor, and enough RAM to make your palms sweat just thinking about it. Straightforward language, clear directions, and extensive illustrations make this guide a breeze for computer builders of any level to follow--even those with little or no experience. If you've yearned for a quality machine with high-end components that suit your needs, then Building the Perfect PC will put you where you want to be: in control of your computer system.

Retro Gaming Hacks

by Chris Kohler

Maybe it was the recent Atari 2600 milestone anniversary that fueled nostalgia for the golden days of computer and console gaming. Every Game Boy must ponder his roots from time to time. But whatever is driving the current retro gaming craze, one thing is certain: classic games are back for a big second act, and they're being played in both old and new ways. Whether you've just been attacked by Space Invaders for the first time or you've been a Pong junkie since puberty, Chris Kohler's Retro Gaming Hacks is the indispensable new guide to playing and hacking classic games. Kohler has complied tons of how-to information on retro gaming that used to take days or weeks of web surfing to track down and sort through, and he presents it in the popular and highly readable Hacks style. Retro Gaming Hacks serves up 85 hard-nosed hacks for reviving the classic games. Want to game on an original system? Kohler shows you how to hack ancient hardware, and includes a primer for home-brewing classic software. Rather adapt today's equipment to run retro games? Kohler provides emulation techniques, complete with instructions for hacking a classic joystick that's compatible with a contemporary computer. This book also teaches readers to revive old machines for the original gaming experience: hook up an Apple II or a Commodore 64, for example, and play it like you played before. A video game journalist and author of Power Up: How Japanese Video Games Gave the World an Extra Life , Kohler has taught the history of video games at Tufts University. In Retro Gaming Hacks , he locates the convergence of classic games and contemporary software, revealing not only how to retrofit classic games for today's systems, but how to find the golden oldies hidden in contemporary programs as well. Whether you're looking to recreate the magic of a Robotron marathon or simply crave a little handheld Donkey Kong, Retro Gaming Hacks shows you how to set the way-back dial.

Palm and Treo Hacks

by Scott Machaffie

Palm OS is one of the most popular handheld operating systems on the planet. From the newest Tungstens and Treos all the way down the family tree, Palms are everywhere. Although the Palm OS is simple to learn and use, there is more to it than meets the eye--from new features in the Palm to capabilities you can get with add-on software, the Palm can be made to do quite a lot. Palm and Treo Hacks gives you tips and tools that show you how to make the most of your Palm. A few minutes spent reading some of the hacks in this book will save you hours of research. Inside this book, you'll learn how to: Find great applications for your Palm and make the most of the ones you're using now Get super-organized, getting more from the built-in Personal Information Manager and learning how to manage complex projects with your Palm Extend the Palm with must-have software and hardware add-ons Take your Palm online, reading email, surfing the web, and sending instant messages Get some rest and relaxation with your Palm, whether it's listening to music, playing classic games, or watching video Written for beginning to experienced Palm users, Palm and Treo Hacks is full of practical, ingenious tips and tricks you can apply immediately. Whether you're looking to master the built-in applications or you want to trick out your Palm to its fullest extent, this book will show you how to get it.

Managing Security with Snort and IDS Tools

by Kerry J. Cox Christopher Gerg

This practical guide to managing network security covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive resource for monitoring illegal entry attempts, Managing Security with Snort and IDS Tools provides step-by-step instructions on getting up and running with Snort 2.1, and how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices.

Linux Desktop Hacks

by Jono Bacon Nicholas Petreley

With hacks that any user can follow, Linux Desktop Hacks demonstrates how easy it is to modify Linux to suit your desires. The book is packed with tips on customizing and improving the interface, boosting performance, administering your desktop, and generally making the most out of what X, KDE, Gnome, and the console have to offer.

iLife '05: The Missing Manual

by David Pogue

The incomparable iLife '05 is the must-have multimedia suite for everyone who owns a Mac--and the envy of everyone who doesn't. iLife '05: The Missing Manual is the definitive iLife '05 book--and what should have come with the suite. There's no better guide to your iLife experience than the #1 bestselling Macintosh author and expert--and Missing Manual series creator--David Pogue. Totally objective and utterly in-the-know, Pogue highlights the newest features, changes, and improvements of iLife '05, covers the capabilities and limitations of each program within the suite, and delivers countless goodies that you won't find anywhere else: undocumented tips, tricks, and secrets for getting the best performance out of every iLife application. Pogue examines all five programs in iLife '05, including: iTunes 4.7 . The digital jukebox software for Mac (and Windows) rips songs from music CDs onto your hard drive, organizes and plays your music collection, lets you buy songs from the iTunes Music Store, and syncs all your music with your iPod. iPhoto 5 . With iPhoto 5, you can pull photos from digital cameras and then organize and present them as a slideshow, desktop picture, screen saver, email attachment, web page, DVD, printout, or hardbound photo book. iMovie HD . Now you can easily import and edit video from the newest High Definition camcorders and even little flash media video cams in all the latest formats. You can turn those seemingly endless home movies into short, fun, tightly edited, top-quality highlight reels that friends and family actually beg to watch. iDVD 5 . Transform your iMovie productions and digital slideshows into Hollywood-style DVDs that play on everyday DVD players. GarageBand 2 . This critically acclaimed program turns a Mac into a digital music-recording studio. With your authoritative, witty, full color, all-inclusive iLife '05: The Missing Manual at the ready, there's nothing standing between you and professional-caliber music, photos, movies, and more.

Switching to the Mac: The Missing Manual, Tiger Edition

by Adam Goldstein David Pogue

It's little wonder that longtime Windows users are migrating in droves to the new Mac. They're fed up with the virus-prone Windows way of life, and they're lured by Apple's well-deserved reputation for producing great all-around computers that are reliable, user-friendly, well designed, and now--with the $500 Mac mini--extremely affordable, too. Whether you're drawn to the Mac's stability, its stunning digital media suite, or the fact that a whole computer can look and feel as slick as your iPod, you can quickly and easily become a Mac convert. But consider yourself warned: a Mac isn't just a Windows machine in a prettier box; it's a whole different animal and a whole new computing experience. If you're contemplating--or have already made--the switch from a Windows PC to a Mac, you need Switching to the Mac: The Missing Manual, Tiger Edition . This incomparable guide delivers what Apple doesn't: everything you need to know to successfully and painlessly move to a Mac. Missing Manual series creator and bestselling author David Pogue teams up with 17-year-old whiz kid and founder of GoldfishSoft (www.goldfishsoft.com) Adam Goldstein to cover every aspect of switching to a Mac--things like transferring email, files, and addresses from a PC to a Mac; getting acquainted with the Mac's interface; adapting to Mac versions of familiar programs (including Microsoft Office); setting up a network to share files with PCs and Macs; and using the printers, scanners, and other peripherals you already own. Covering the latest in Mac OS X v.10.4 "Tiger," Switching to the Mac: The Missing Manual, Tiger Edition explains the hundreds of innovative new features to the Mac OS and how you can understand and make the very most of each. Whether you're a novice or a power user, Switching to the Mac: The Missing Manual, Tiger Edition , teaches you how to smoothly and seamlessly replace (or supplement) your Windows machine--in a refreshingly funny and down-to-earth style--with a mighty Mac.

Modding Mac OS X

by Erica Sadun

Modding Mac OS X isn't about cutting up your Power Mac's case with a saws-all; it's about modifying Mac OS X's user interface and unlocking secrets and dispelling your fears of the Unix command line so you can take command of your Mac. Modding Mac OS X starts out with the very basics of showing you how to configure your Mac and do simple things like change Finder views, use an image from iPhoto's library on your desktop, and how to find and use screen savers. From there, Modding Mac OS X shows you how to: Find hidden features in your favorite applications Dive inside application bundles to find hidden resources Change application and system-wide keyboard shortcuts Work with the Property List Editor to read and edit property list files Wrap your head around the defaults command to tweak an application's settings Hack on NIB files to change an application's interface Control an application with AppleScript, even if it isn't scriptable Each Modding example includes detailed step-by-step instructions that even a novice Mac user can follow, while also providing the necessary detail to satisfy the experienced hacker. The knowledge you gain from tweaking one application can be easily applied to the next. So go on, empower your inner Mac geek. You know you want to.

GarageBand 2: The Missing Manual

by David Pogue

Whether you're a professional musician or a mere novice, Apple's GarageBand software has everything you need to produce commercial-quality recordings entirely on your own. Just imagine how many thousands of singers and instrumentalists remain undiscovered because they lack the capability to produce viable demos. Well, no more. Now there's no need to assemble a backup band or book time at a professional studio--GarageBand has it covered. And GarageBand 2: The Missing Manual gives you the know-how you need to make it all happen. It's an authoritative, witty guide to constructing digital recordings with GarageBand. Written by the master of the Missing Manual series, and a musician himself, David Pogue, this top-selling book shows you how to maximize the program's entire set of tools. Pre-recorded loops, sampled sounds, live recordings--they're all explained in easy-to-understand language. It also shows you how to apply professional-sounding effects like reverb or chorusing, and then export the finished product to iTunes, where you can download your work to an iPod, export it as an MP3, or burn it onto CDs. Now revised to reflect GarageBand's latest features, this book's second edition also addresses how to: use GarageBand's eight-track capabilities display music notation in real time enhance timing and pitch for better quality recordings change the tempo and key of recorded instruments tune guitars with GarageBand before recording So if you're chasing a dream or just having fun, GarageBand 2: The Missing Manual is the only resource you need to make the finest musical recordings possible.

Database in Depth: Relational Theory for Practitioners

by C. J. Date

This book sheds light on the principles behind the relational model, which is fundamental to all database-backed applications--and, consequently, most of the work that goes on in the computing world today. Database in Depth: The Relational Model for Practitioners goes beyond the hype and gets to the heart of how relational databases actually work. Ideal for experienced database developers and designers, this concise guide gives you a clear view of the technology--a view that's not influenced by any vendor or product. Featuring an extensive set of exercises, it will help you: understand why and how the relational model is still directly relevant to modern database technology (and will remain so for the foreseeable future) see why and how the SQL standard is seriously deficient use the best current theoretical knowledge in the design of their databases and database applications make informed decisions in their daily database professional activities Database in Depth will appeal not only to database developers and designers, but also to a diverse field of professionals and academics, including database administrators (DBAs), information modelers, database consultants, and more. Virtually everyone who deals with relational databases should have at least a passing understanding of the fundamentals of working with relational models. Author C.J. Date has been involved with the relational model from its earliest days. An exceptionally clear-thinking writer, Date lays out principle and theory in a manner that is easily understood. Few others can speak as authoritatively the topic of relational databases as Date can.

Security and Usability

by Lorrie Cranor Simson Garfinkel

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them. But there is a growing recognition that today's security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable software. Indeed, the world's future cyber-security depends upon the deployment of security technology that can be broadly used by untrained computer users. Still, many people believe there is an inherent trade-off between computer security and usability. It's true that a computer without passwords is usable, but not very secure. A computer that makes you authenticate every five minutes with a password and a fresh drop of blood might be very secure, but nobody would use it. Clearly, people need computers, and if they can't use one that's secure, they'll use one that isn't. Unfortunately, unsecured systems aren't usable for long, either. They get hacked, compromised, and otherwise rendered useless. There is increasing agreement that we need to design secure systems that people can actually use, but less agreement about how to reach this goal. Security and Usability is the first book-length work describing the current state of the art in this emerging field. Edited by security experts Dr. Lorrie Faith Cranor and Dr. Simson Garfinkel, and authored by cutting-edge security and human-computer interaction (HCI) researchers world-wide, this volume is expected to become both a classic reference and an inspiration for future research. Security and Usability groups 34 essays into six parts: Realigning Usability and Security-- with careful attention to user-centered design principles, security and usability can be synergistic. Authentication Mechanisms-- techniques for identifying and authenticating computer users. Secure Systems-- how system software can deliver or destroy a secure user experience. Privacy and Anonymity Systems-- methods for allowing people to control the release of personal information. Commercializing Usability: The Vendor Perspective-- specific experiences of security and software vendors (e.g., IBM, Microsoft, Lotus, Firefox, and Zone Labs) in addressing usability. The Classics-- groundbreaking papers that sparked the field of security and usability. This book is expected to start an avalanche of discussion, new ideas, and further advances in this important field.

Programming Windows Presentation Foundation

by Ian Griffiths Chris Sells

Windows Presentation Foundation (WPF) (formerly known by its code name "Avalon") is a brand-new presentation framework for Windows XP and Windows Vista, the next version of the Windows client operating system. For developers, WPF is a cornucopia of new technologies, including a new graphics engine that supports 3-D graphics, animation, and more; an XML-based markup language (XAML) for declaring the structure of your Windows UI; and a radical new model for controls. Programming Windows Presentation Foundation is the book you need to get up to speed on WPF. By page two, you'll have written your first WPF application, and by the end of Chapter 1, "Hello WPF," you'll have completed a rapid tour of the framework and its major elements. These include the XAML markup language and the mapping of XAML markup to WinFX code; the WPF content model; layout; controls, styles, and templates; graphics and animation; and, finally, deployment. Programming Windows Presentation Foundation features: Scores of C# and XAML examples that show you what it takes to get a WPF application up and running, from a simple "Hello, Avalon" program to a tic-tac-toe game Insightful discussions of the powerful new programming styles that WPF brings to Windows development, especially its new model for controls A color insert to better illustrate WPF support for 3-D, color, and other graphics effects A tutorial on XAML, the new HTML-like markup language for declaring Windows UI An explanation and comparison of the features that support interoperability with Windows Forms and other Windows legacy applications The next generation of Windows applications is going to blaze a trail into the unknown. WPF represents the best of the control-based Windows world and the content-based web world; it's an engine just itching to be taken for a spin. Inside, you'll find the keys to the ignition.

Ending Spam

by Jonathan A. Zdziarski

Join author John Zdziarski for a look inside the brilliant minds that have conceived clever new ways to fight spam in all its nefarious forms. This landmark title describes, in-depth, how statistical filtering is being used by next-generation spam filters to identify and filter unwanted messages, how spam filtering works and how language classification and machine learning combine to produce remarkably accurate spam filters. After reading Ending Spam , you'll have a complete understanding of the mathematical approaches used by today's spam filters as well as decoding, tokenization, various algorithms (including Bayesian analysis and Markovian discrimination) and the benefits of using open-source solutions to end spam. Zdziarski interviewed creators of many of the best spam filters and has included their insights in this revealing examination of the anti-spam crusade. If you're a programmer designing a new spam filter, a network admin implementing a spam-filtering solution, or just someone who's curious about how spam filters work and the tactics spammers use to evade them, Ending Spam will serve as an informative analysis of the war against spammers. TOC Introduction PART I: An Introduction to Spam Filtering Chapter 1: The History of Spam Chapter 2: Historical Approaches to Fighting Spam Chapter 3: Language Classification Concepts Chapter 4: Statistical Filtering Fundamentals PART II: Fundamentals of Statistical Filtering Chapter 5: Decoding: Uncombobulating Messages Chapter 6: Tokenization: The Building Blocks of Spam Chapter 7: The Low-Down Dirty Tricks of Spammers Chapter 8: Data Storage for a Zillion Records Chapter 9: Scaling in Large Environments PART III: Advanced Concepts of Statistical Filtering Chapter 10: Testing Theory Chapter 11: Concept Identification: Advanced Tokenization Chapter 12: Fifth-Order Markovian Discrimination Chapter 13: Intelligent Feature Set Reduction Chapter 14: Collaborative Algorithms Appendix: Shining Examples of Filtering Index

Java I/O

by Elliotte Rusty Harold

All of Java's Input/Output (I/O) facilities are based on streams, which provide simple ways to read and write data of different types. Java I/O tells you all you need to know about the four main categories of streams and uncovers less-known features to help make your I/O operations more efficient. You'll also learn how to control number formatting, use characters aside from the standard ASCII character set, and get a head start on writing truly multilingual software.

iPhoto 5: The Missing Manual, 4th Edition

by David Pogue Derrick Story

Our Missing Manual is hands-down the bestselling book on iPhoto. And now, updated to cover Apple's newest release, iPhoto 5: The Missing Manual comes fully loaded--and in full color--so you can exercise all the power, flexibility, and creativity of the stunning new iPhoto 5. Some of iPhoto 5's fifty new features are tiny nips and tucks, such as menu rewordings, quiet refinements, and secret keystrokes that take most people days to stumble through. Others are big-ticket overhauls aimed at both power users (RAW-file import and editing, color correction sliders, real-time histogram) and everyday shutterbugs (nested file folders, individual-photo control in slideshows, and a completely rewritten book-layout kit). Additional improvements include a robust search feature (similar to that of iTunes) and the addition of "objects" for slideshow and book projects (using objects, you can manipulate images without affecting pictures in your master library). iPhoto 5: The Missing Manual covers them all with the scrupulous objectivity, clever wit, and technical wisdom you count on from David Pogue along with the Mac and digital photography expertise of Derrick Story. Their authoritative guide starts out with a crash course on digital photography, complete with tutorials on buying a digital camera, composing brilliant photos in various situations (including sports photography, portraits, nighttime photography--even kid photography!) and making digital movies. iPhoto 5: The Missing Manual then launches into every detail of iPhoto, from camera-meets-Mac basics to storing, searching, and editing; from sharing your digital photography with the world (via customized slideshows--complete with iTunes soundtrack, if you like--prints, photo books, email, the Web, and even your network) to exporting to QuickTime and iDVD. And don't forget iPhoto "stunts," such as building custom screen savers and desktop backdrops; exporting pictures; making the most of plug-ins, add-ons, and beef-ups; using AppleScript; and managing files with backups, CDs, and photo libraries. iPhoto 5: The Missing Manual gives you everything you need to become the digital photographer extraordinaire you want to be.

Exim

by Philip Hazel

Exim is the default mail transport agent installed on some Linux systems; it runs on many versions of Unix and is suitable for any TCP/IP network with any combination of hosts and end-user mail software. It is open source, scalable, rich in features, and--best of all--easy to configure. This official guide is written by Philip Hazel, the creator of Exim.

Essential SNMP, 2nd Edition

by Douglas Mauro Kevin Schmidt

Simple Network Management Protocol (SNMP) provides a "simple" set of operations that allows you to more easily monitor and manage network devices like routers, switches, servers, printers, and more. The information you can monitor with SNMP is wide-ranging--from standard items, like the amount of traffic flowing into an interface, to far more esoteric items, like the air temperature inside a router. In spite of its name, though, SNMP is not especially simple to learn. O'Reilly has answered the call for help with a practical introduction that shows how to install, configure, and manage SNMP. Written for network and system administrators, the book introduces the basics of SNMP and then offers a technical background on how to use it effectively. Essential SNMP explores both commercial and open source packages, and elements like OIDs, MIBs, community strings, and traps are covered in depth. The book contains five new chapters and various updates throughout. Other new topics include: Expanded coverage of SNMPv1, SNMPv2, and SNMPv3 Expanded coverage of SNMPc The concepts behind network management and change management RRDTool and Cricket The use of scripts for a variety of tasks How Java can be used to create SNMP applications Net-SNMP's Perl module The bulk of the book is devoted to discussing, with real examples, how to use SNMP for system and network administration tasks. Administrators will come away with ideas for writing scripts to help them manage their networks, create managed objects, and extend the operation of SNMP agents. Once demystified, SNMP is much more accessible. If you're looking for a way to more easily manage your network, look no further than Essential SNMP, 2nd Edition .

Revolution in the Valley: The Insanely Great Story of How the Mac Was Made

by Andy Hertzfeld

There was a time, not too long ago, when the typewriter and notebook ruled, and the computer as an everyday tool was simply a vision. Revolution in the Valley traces this vision back to its earliest roots: the hallways and backrooms of Apple, where the groundbreaking Macintosh computer was born. The book traces the development of the Macintosh, from its inception as an underground skunkworks project in 1979 to its triumphant introduction in 1984 and beyond. The stories in Revolution in the Valley come on extremely good authority. That's because author Andy Hertzfeld was a core member of the team that built the Macintosh system software, and a key creator of the Mac's radically new user interface software. One of the chosen few who worked with the mercurial Steve Jobs, you might call him the ultimate insider. When Revolution in the Valley begins, Hertzfeld is working on Apple's first attempt at a low-cost, consumer-oriented computer: the Apple II. He sees that Steve Jobs is luring some of the company's most brilliant innovators to work on a tiny research effort the Macintosh. Hertzfeld manages to make his way onto the Macintosh research team, and the rest is history. Through lavish illustrations, period photos (many never before published), and Hertzfeld's vivid first-hand accounts, Revolution in the Valley reveals what it was like to be there at the birth of the personal computer revolution. The story comes to life through the book's portrait of the talented and often eccentric characters who made up the Macintosh team. Now, over 20 years later, millions of people are benefiting from the technical achievements of this determined and brilliant group of people.

Refine Search

Showing 53,276 through 53,300 of 53,657 results