Browse Results What Download Format Should I Choose?

Showing 1,576 through 1,600 of 1,815 results

Study Guide to Accompany Java Concepts: Advanced Placement Computer Science (5th Edition)

by Cay S. Horstmann Frances P. Trees

This Study Guide is designed to assist high school students preparing for the AP Computer Science Examination. It is organized and designed to accompany Java Concepts for AP Computer Science, 5th ed., by Cay Horstmann and published by John Wiley & Sons, Inc. The Guide may also be used with Big Java, 3rd ed., also by Cay Horstmann.

Subclassing and Hooking with Visual Basic

by Stephen Teilhet

Subclassing & Hooking with Visual Basic offers developers a unique way to customize Windows behavior. Windows is a message-based system. Every action you request creates one or more messages to carry out the action. These messages are passed between objects and carry with them information that gives the recipient more detail on how to interpret and act upon the message. With Subclassing and the Windows hooking mechanism ("hooks"), you can manipulate, modify, or even discard messages bound for other objects within the operating system, in the process changing the way the system behaves. What kinds of results can you achieve using the power of subclassing and hooking? Here are just a few of the possibilities: Determine when a window is being activated or deactivated and respond to this change. Display descriptions of menu items as the mouse moves across them. Disallow a user to move or resize a window. Determine where the mouse cursor is and respond accordingly. Determine when the display resolution has been changed. Monitor the system for a low system resource condition. Modify or disallow keystrokes sent to a window or a control. Create an automated testing application. Determine when an application is idle. Along with this power comes responsibility; Windows is very unforgiving if subclassing and hooking are used incorrectly. Subclassing and Hooking with Visual Basic demonstrates the various techniques for intercepting messages bound for one or more windows or controls: the intercepted message can be left in its original state or modified; afterward, the message can be sent to its original destination or discarded. For both VB 6 and VB.NET developers, Subclassing and Hooking with Visual Basic opens up a wealth of possibilities that ordinarily would be completely unavailable, or at least not easy to implement.

Succeeding in Business with Microsoft Excel 2010: A Problem-solving Approach

by Debra Gross Frank Akaiwa Karleen Nordquist

SUCCEEDING IN BUSINESS WITH MICROSOFT OFFICE EXCEL 2010 prepares your students to solve business problems by moving beyond the basic "point and click" skills to think critically about realistic business situations. When students combine software analysis with their own decision making abilities, they are more likely meet any business challenge with success. The Succeeding in Business Series emphasizes problem-solving, critical thinking, and analysis - challenging students to find efficient and effective sol

Superwrite: Alphabetic Writing System, Office Professional (Volume 1, 2nd Edition)

by A. James Lemaster John Baer

Volume One introduces SuperWrite theory and beginning transcription principles. The step-by-step approach to writing principles guides students to alphabetic writing success. Eight lessons develop personal success factors such as goal-setting, problem-solving, time management, attendance, and promptness. Updated keyboarding style references reflect current business practices.

SUSE Linux: A Complete Guide to Novell's Community Distribution

by Christopher R. Browning

SUSE Linux: A Complete Guide to Novell's Community Distribution will get you up to speed quickly and easily on SUSE, one of the most friendly and usable Linux distributions around. From quick and easy installation to excellent hardware detection and support, it's no wonder SUSE is one of the most highly rated distributions on the planet. According to Novell, SUSE is installed more than 7,000 times every day, an average of one installation every 12 seconds. This book will take you deep into the essential operating system components by presenting them in easy-to-learn modules. From basic installation and configuration through advanced topics such as administration, security, and virtualization, this book captures the important details of how SUSE works--without the fluff that bogs down other books and web sites. Instead, readers get a concise task-based approach to using SUSE as both a desktop and server operating system. In this book, you'll learn how to: Install SUSE and perform basic administrative tasks Share files with other computers Connect to your desktop remotely Set up a web server Set up networking, including Wi-Fi and Bluetooth Tighten security on your SUSE system Monitor for intrusions Manage software and upgrades smoothly Run multiple instances of SUSE on a single machine with Xen Whether you use SUSE Linux from Novell, or the free openSUSE distribution, this book has something for every level of user. The modular, lab-based approach not only shows you how--but also explains why--and gives you the answers you need to get up and running with SUSE Linux. About the author: Chris Brown is a freelance author and trainer in the United Kingdom and Europe. Following Novell's acquisition of SUSE, he taught Linux to Novell's consultants and IT staff and is certified in both Novell's CLP program and Red Hat's RHCE. Chris has a PhD in particle physics from Cambridge.

SVG Essentials

by J. David Eisenberg

Scalable Vector Graphics -- or SVG -- is the new XML-based graphics standard from the W3C that will enable Web documents to be smaller, faster and more interactive. This insightful book takes you through the ins and outs of SVG, from the basics to more complicated features. Whether you're a graphic designer looking for new tools, or a programmer creating and managing graphics, this book provides a solid foundation.

Swing Hacks

by Chris Adamson Joshua Marinacci

Swing Hacks helps Java developers move beyond the basics of Swing, the graphical user interface (GUI) standard since Java 2. If you're a Java developer looking to build enterprise applications with a first-class look and feel, Swing is definitely one skill you need to master. This latest title from O'Reilly is a reference to the cool stuff in Swing. It's about the interesting things you learn over the years--creative, original, even weird hacks--the things that make you say, "I didn't know you could even do that with Swing!" Swing Hacks will show you how to extend Swing's rich component set in advanced and sometimes non-obvious ways. The book touches upon the entire Swing gamut-tables, trees, sliders, spinners, progress bars, internal frames, and text components. Detail is also provided on JTable/JTree, threaded component models, and translucent windows. You'll learn how to filter lists, power-up trees and tables, and add drag-and-drop support. Swing Hacks will show you how to do fun things that will directly enhance your own applications. Some are visual enhancements to make your software look better. Some are functional improvements to make your software do something it couldn't do before. Some are even just plain silly, in print only to prove it could be done. The book will also give you give you a small glimpse of the applications coming in the future. New technology is streaming into the Java community at a blistering rate, and it gives application developers a whole new set of blocks to play with. With its profusion of tips and tricks, Swing Hacks isn't just for the developer who wants to build a better user interface. It's also ideally suited for client-side Java developers who want to deliver polished applications, enthusiasts who want to push Java client application boundaries, and coders who want to bring powerful techniques to their own applications. Whatever your programming needs, Swing Hacks is packed with programming lessons that increase your competency with interface-building tools.

Switching to the Mac: The Missing Manual, Lion Edition

by David Pogue

Ready to move to the Mac? This incomparable guide helps you make a smooth transition. New York Times columnist and Missing Manuals creator David Pogue gets you past three challenges: transferring your stuff, assembling Mac programs so you can do what you did with Windows, and learning your way around Mac OS X. Learning to use a Mac is not a piece of cake, but once you do, the rewards are oh-so-much better. No viruses, worms, or spyware. No questionable firewalls or inefficient permissions. Just a beautiful machine with a thoroughly reliable system. Whether you're using Windows XP or Windows 7, we've got you covered. Transfer your stuff. Moving files from a PC to a Mac is the easy part. This guide gets you through the tricky things: extracting your email, address book, calendar, Web bookmarks, buddy list, desktop pictures, and MP3 files. Re-create your software suite. Big-name programs from Microsoft, Adobe, and others are available in both Mac and Windows versions. But hundreds of other programs are Windows-only. Learn the Macintosh equivalents and how to move data to them. Learn Mac OS X Lion. Once you've moved into the Macintosh mansion, it's time to learn your way around. You're in good hands with the author of Mac OS X: The Missing Manual, the #1 bestselling guide to Mac OS X.

Switching to the Mac: The Missing Manual, Mountain Lion Edition

by David Pogue

Ready to move to the Mac? This incomparable guide helps you make a smooth transition. New York Times columnist and Missing Manuals creator David Pogue gets you past three challenges: transferring your stuff, assembling Mac programs so you can do what you did with Windows, and learning your way around OS X. Learning to use a Mac is not a piece of cake, but once you do, the rewards are oh-so-much better. You won't find questionable firewalls or inefficient permissions. Just a beautiful machine with a thoroughly reliable system. Whether you're using Windows XP or Windows 7, we've got you covered. Transfer your stuff. Moving files from a PC to a Mac is the easy part. This guide gets you through the tricky things: extracting your email, address book, calendar, Web bookmarks, buddy list, desktop pictures, and MP3 files. Re-create your software suite. Big-name programs from Microsoft, Adobe, and others are available in both Mac and Windows versions, but hundreds of other programs are Windows-only. Learn the Macintosh equivalents and how to move data to them. Learn OS X Mountain Lion. Once you've moved into the Macintosh mansion, it's time to learn your way around. You're in good hands with the author of Mac OS X: The Missing Manual, the #1 bestselling guide to OS X.<P> Advisory: It has been reported to us that the publisher provided this book to us with images of keyboard keys that do not have image descriptions.

Switching to the Mac: The Missing Manual, Tiger Edition

by David Pogue Adam Goldstein

It's little wonder that longtime Windows users are migrating in droves to the new Mac. They're fed up with the virus-prone Windows way of life, and they're lured by Apple's well-deserved reputation for producing great all-around computers that are reliable, user-friendly, well designed, and now--with the $500 Mac mini--extremely affordable, too. Whether you're drawn to the Mac's stability, its stunning digital media suite, or the fact that a whole computer can look and feel as slick as your iPod, you can quickly and easily become a Mac convert. But consider yourself warned: a Mac isn't just a Windows machine in a prettier box; it's a whole different animal and a whole new computing experience. If you're contemplating--or have already made--the switch from a Windows PC to a Mac, you need Switching to the Mac: The Missing Manual, Tiger Edition . This incomparable guide delivers what Apple doesn't: everything you need to know to successfully and painlessly move to a Mac. Missing Manual series creator and bestselling author David Pogue teams up with 17-year-old whiz kid and founder of GoldfishSoft (www.goldfishsoft.com) Adam Goldstein to cover every aspect of switching to a Mac--things like transferring email, files, and addresses from a PC to a Mac; getting acquainted with the Mac's interface; adapting to Mac versions of familiar programs (including Microsoft Office); setting up a network to share files with PCs and Macs; and using the printers, scanners, and other peripherals you already own. Covering the latest in Mac OS X v.10.4 "Tiger," Switching to the Mac: The Missing Manual, Tiger Edition explains the hundreds of innovative new features to the Mac OS and how you can understand and make the very most of each. Whether you're a novice or a power user, Switching to the Mac: The Missing Manual, Tiger Edition , teaches you how to smoothly and seamlessly replace (or supplement) your Windows machine--in a refreshingly funny and down-to-earth style--with a mighty Mac.

Switching to VoIP

by Theodore Wallingford

More and more businesses today have their receive phone service through Internet instead of local phone company lines. Many businesses are also using their internal local and wide-area network infrastructure to replace legacy enterprise telephone networks. This migration to a single network carrying voice and data is called convergence, and it's revolutionizing the world of telecommunications by slashing costs and empowering users. The technology of families driving this convergence is called VoIP, or Voice over IP. VoIP has advanced Internet-based telephony a viable solution, piquing the interest of companies small and large. The primary reason for migrating to VoIP is cost, as it equalizes the costs of long distance calls, local calls, and e-mails to fractions of a penny per use. But the real enterprise turn-on is how VoIP empowers businesses to mold and customize telecom and datacom solutions using a single, cohesive networking platform. These business drivers are so compelling that legacy telephony is going the way of the dinosaur, yielding to Voice over IP as the dominant enterprise communications paradigm. Developed from real-world experience by a senior developer, O'Reilly's Switching to VoIP provides solutions for the most common VoIP migration challenges. So if you're a network professional who is migrating from a traditional telephony system to a modern, feature-rich network, this book is a must-have. You'll discover the strengths and weaknesses of circuit-switched and packet-switched networks, how VoIP systems impact network infrastructure, as well as solutions for common challenges involved with IP voice migrations. Among the challenges discussed and projects presented: building a softPBX configuring IP phones ensuring quality of service scalability standards-compliance topological considerations coordinating a complete system ?switchover? migrating applications like voicemail and directory services retro-interfacing to traditional telephony supporting mobile users security and survivability dealing with the challenges of NAT To help you grasp the core principles at work, Switching to VoIP uses a combination of strategy and hands-on "how-to" that introduce VoIP routers and media gateways, various makes of IP telephone equipment, legacy analog phones, IPTables and Linux firewalls, and the Asterisk open source PBX software by Digium. You'll learn how to build an IP-based or legacy-compatible phone system and voicemail system complete with e-mail integration while becoming familiar with VoIP protocols and devices. Switching to VoIP remains vendor-neutral and advocates standards, not brands. Some of the standards explored include: SIP H.323, SCCP, and IAX Voice codecs 802.3af Type of Service, IP precedence, DiffServ, and RSVP 802.1a/b/g WLAN If VoIP has your attention, like so many others, then Switching to VoIP will help you build your own system, install it, and begin making calls. It's the only thing left between you and a modern telecom network.

SWT: A Developer's Notebook

by Tim Hatton

In typical Developer's Notebook style, you'll learn how to take SWT out for a spin, make it work for you,and turn it upside down, all without wasted words or space. Each lab in this notebook details a specific task; you can read from the first page to the last, look up just what you need to know, and even squeeze this book into your laptop bag as a quick reference when you forget how to create a multi-tabbed view.

Syngress IT Security Project Management Handbook

by Susan Snedaker

The First and Last Word on Managing IT Security Projects As the late management guru Peter Drucker once said, "Plans are only good intentions unless they immediately degenerate into hard work." The intent of this book is not to lead you through long, arduous planning processes while hackers are stealing your network out from under you. The intent is to provide you with effective network security planning tools so that you can "degenerate into hard work" as quickly as possible to keep your network secure with the least amount of effort. Rather than losing sleep at night wondering who's wandering around your network in the dark, you can create a comprehensive security solution for your company that will meet your security needs today and will allow you to address new security requirements in the future. This book is designed to help you do exactly that. Analyze the Cost of Prevention Versus Remediation How to determine if preventing a security breach is less costly than fixing it once it occurs. Identify the Right Project Management Team Determine who will be affected and make certain they are on board from the start. Monitor IT Security Project Quality Many companies must comply with specific monitoring requirements to meet industry or governmental regulations. Create a Work Breakdown Structure (WBS) Be sure that your WBS tasks are at the same level by keeping the level of detail consistent. Create Reliable Documentation Your documentation should be well defined and completed in as near real time as possible. Implement Individual Security Analysis Programs (ISAPs) Testing requires an active "push" against security areas to ensure they don't collapse. Close the Issues Log, Change Requests, and Error Reports Addressing known issues in a reasonable manner and documenting those resolutions are important elements of reducing risk. Review Legal Standards Relevant to Your Project Failure to understand the legal implications may leave your company at substantial legal risk. Walk Through a Complete Plan Includes a step-by-step security project plan for a security assessment and audit project

Synthetic Worlds: The Business and Culture of Online Games

by Edward Castronova

Castronova offers the first comprehensive look at the online game industry, exploring its implications for business and culture alike. He starts with the players, giving us a revealing look into the everyday lives of the gamers--outlining what they do in their synthetic worlds and why.

System Performance Tuning, 2nd Edition

by Mike Loukides Gian-Paolo D. Musumeci

System Performance Tuning answers one of the most fundamental questions you can ask about your computer: How can I get it to do more work without buying more hardware? In the current economic downturn, performance tuning takes on a new importance. It allows system administrators to make the best use of existing systems and minimize the purchase of new equipment. Well-tuned systems save money and time that would otherwise be wasted dealing with slowdowns and errors. Performance tuning always involves compromises; unless system administrators know what the compromises are, they can't make intelligent decisions. Tuning is an essential skill for system administrators who face the problem of adapting the speed of a computer system to the speed requirements imposed by the real world. It requires a detailed understanding of the inner workings of the computer and its architecture. System Performance Tuning covers two distinct areas: performance tuning, or the art of increasing performance for a specific application, and capacity planning, or deciding what hardware best fulfills a given role. Underpinning both subjects is the science of computer architecture. This book focuses on the operating system, the underlying hardware, and their interactions. Topics covered include: Real and perceived performance problems, introducing capacity planning and performance monitoring (highlighting their strengths and weaknesses). An integrated description of all the major tools at a system administrator's disposal for tracking down system performance problems. Background on modern memory handling techniques, including the memory-caching filesystem implementations in Solaris and AIX. Updated sections on memory conservation and computing memory requirements. In depth discussion of disk interfaces, bandwidth capacity considerations, and RAID systems. Comprehensive discussion of NFS and greatly expanded discussion of networking. Workload management and code tuning. Special topics such as tuning Web servers for various types of content delivery and developments in cross-machine parallel computing For system administrators who want a hands-on introduction to system performance, this is the book to recommend.

Systematics as Cyberscience: Computers, Change, and Continuity in Science

by Christine Hine

An exploration of the use of information and communication technologies by biologists working in systematics (taxonomy) and the dynamics of change and continuity with past practices in the development of systematics as a cyberscience.

Systems, Experts and Computers: The Systems Approach in Management and Engineering, World War II and After

by Agatha C. Hughes Thomas P. Hughes

After World War II, a systems approach to solving complex problems and managing complex systems came into vogue among engineers, scientists, and managers, fostered in part by the diffusion of digital computing power.

T1: A Survival Guide

by Matthew Gast

This practical, applied reference to T1 for system and network administrators brings together in one place the information you need to set up, test, and troubleshoot T1. You'll learn what components you need to build a T1 line; how the components interact to transmit data; how to adapt the T1 to work with data networks using standardized link layer protocols; troubleshooting strategies; and working with vendors.

Tablet PC Quick Reference

by Microsoft Corporation

<div xmlns="http://www.w3.org/1999/xhtml"><p>In a meeting, in the hallway, or on the run\u2014achieve ultimate mobility with the TABLET PC QUICK REFERENCE. This expert guide shows how to get up and running faster with the Tablet\u2019s digital pen, Input Panel, Windows\xae Journal, speech recognition, and more.</p></div>

Take Control of 1Password

by Joe Kissell

Speed through Web logins with 1Password 4!Remembering and entering Web passwords is both difficult and insecure, but it doesn't have to be that way, thanks to 1Password, the popular password manager from AgileBits. In this ebook, Joe Kissell brings years of real-world 1Password experience into play--plus many hours with the 1Password 4 for Mac beta--to explain not only how to create, edit, and enter Web login data easily, but also how to autofill contact and credit card information when shopping online, audit your passwords and generate better ones, and share your passwords with key people and among multiple devices. Joe focuses on 1Password 4 for the Mac, but he also provides details and directions for the iOS, Windows, and Android versions of 1Password.You'll find expert advice on these topics:Meet 1Password: Set your master passcode and make first-run configuration decisions. Explore usage strategies for 1Password on your Mac, PC, iOS device, or Android handheld, and understand the different components of the software on the different platforms. Get lots of ideas for how to share your vault (or vaults!) among your devices and with other people.Master logins: In 1Password, a typical login contains a set of credentials used to sign in to a Web site. Find out how to create logins, sort them, search them, tag them, delete them, and more. You'll especially find help with editing logins. For example, if you change a password from dragon7 to eatsevendragonsforlunchatyahoo, you'll want to incorporate that into its login. Or, use 1Password's password generator to come up with complex passwords, like dGx7Crve3WucELF#s.Understand password security: Get guidance on what makes for a good password, and read Joe's important Password Dos and Don'ts. An advanced topic later in the ebook covers how to perform a security audit in order to improve poor passwords quickly. (For Joe's full advice on passwords, read Take Control of Your Passwords.)Go beyond Web logins: For a lot of people, a primary point of 1Password is to speed the process of signing in to Web sites. But 1Password can do much more. Learn about storing and autofilling contact information (for more than one identity, even), and your credit card number and security code. You'll also find advice on storing passwords for password-protected files and encrypted disk images, plus ideas for keeping track of confidential files, private diary entries, scans of important cards or documents, and more.You'll also discover the answers to key questions, including: What are the main changes between 1Password 3 and 1Password 4?In addition to 1Password, should I use my Web browser's password, contact, or credit card autofill feature? What about Apple's iCloud Keychain?What is the fastest way to get 1Password to sign me in to a Web site?My login item used to sign me in, but it stopped working. What should I do?I made a long, random password for my bank account, but it wasn't saved in the login item! Where can I find it?How can I use one username and password with multiple Web sites, like one Apple ID for both iCloud and the online Apple Store?What if I need to access my 1Password data from another person's computer?How can I speed up Web logins and filling in shopping cart info with 1Password in iOS or Android?Is it true that I can initiate 1Password login items from keyboard launcher utilities like LaunchBar, Alfred, and Quicksilver? (Hint: the answer is yes!)

Take Control of Apple Mail

by Joe Kissell

Master Mail in Mavericks and iOS 7! Email is essential for everything from work to shopping to keeping in touch with family. Could you get anything done without it? In this book, email expert Joe Kissell helps you make sure Apple Mail won't leave you in the lurch, providing essential setup, usage, and troubleshooting advice, whether you use Gmail, iCloud, Exchange, or IMAP -- or more than one -- in both OS X 10.9 Mavericks on your Mac and iOS 7 on your iPad, iPhone, or iPod touch.Along the way, Joe explains core concepts like special IMAP mailboxes and email archiving, reveals Mail's hidden interface elements, and offers tips on customizing Mail to your preferences (including the best power-user plugins for Mail on the Mac). You'll also learn how to find that message in the haystack, figure out how digital signatures and encryption work in Mail, and uncover solutions to numerous common problems. Perhaps most important, Joe shares his strategy for avoiding email overload; the article where he first introduced it won American Business Media's Neal Award for Best How-To Article.Using the fully linked table of contents, Quick Start page, or other hot links in the ebook, you'll quickly find the essential information that's most important to you, including: * Key changes in Mail for Mavericks * Interesting new features in Mail for iOS 7 * Setting Mail's Junk Mail filter correctly and other tips for defeating spam * Understanding special mailboxes like Sent, Drafts, and Junk * Addressing email to multiple recipients -- and to smart groups * Using notifications to manage incoming messages * Turning on the much-loved classic window arrangement * Customizing the Mail sidebar, toolbar, message header interface, and more * Using search tokens AND understanding Boolean searches * Joe's suggested smart mailboxes * Taking charge of email organization with rules and other measures * Keeping attachments problem-free * 12 things you should know about iOS Mail * Fixing problems: receiving, sending, logging in, bad mailboxes, and more * Mail plugins that will improve your Mail experience * How to decide if you should encrypt your email * Detailed, real-world steps for signing and encrypting email

Take Control of Backing Up Your Mac

by Joe Kissell

Set up a rock-solid backup strategy so that you can restore quickly and completely, no matter what catastrophe arises.Read along as backup guru Joe Kissell helps you understand the three components of a solid backup strategy, implement that strategy in a way that meets your specific needs, and understand the hows and whys of what you are doing, taking you far beyond the limited security of turning on Time Machine or copying a few files to a flash drive or cloud service. You'll also find details on how to test your backup system, and on how to restore from backup. Whether you're running Mac OS X 10.7 Lion or 10.8 Mountain Lion, you'll soon have a reliable, up-to-date backup system.Although the 201-page ebook is organized so you can start backing up without reading every page, the full ebook will teach you to:Design a reliable backup system. If you're developing a new backup system, you'll learn how to make it not only thorough, ensuring that all your data is safe, but also easy to manage and appropriate for your situation. If you're assessing an existing backup system, Joe discusses how to evaluate it and offers guidance for improving and modernizing it.Talk like an expert. You'll learn the meaning of terms like "versioned backups," "delta encoding," "push" and "pull" backups, "duplicates," "server," "client," "incremental," "hard link," "mirroring," and "snapshot."Choose backup software. Consider the pros and cons of Apple's free Time Machine and determine whether it's a good match for you--or if you should consider a different program with better features for your needs. You'll learn about 14 key features to look for in backup apps and find overviews and tips for 8 noteworthy products (an online appendix covers nearly 100 options), plus several suggestions for online backups. You'll also get Joe's recommendations to help you sort through the possibilities.Shop for hardware. You'll discover the pros and cons of backup media options such as hard drives (with USB, FireWire, eSATA, or Thunderbolt interfaces--and with or without full-disk encryption), flash drives, optical media, tape drives, RAIDs, Drobo storage devices, Time Capsules, and NAS and SAN devices.Operate Time Machine. Find out what goes on beneath Time Machine's simple surface, and how best to make use of Apple's built-in backup system, including how local snapshots work when your Time Machine volume isn't available, and how to encrypt a Time Machine backup.Make backups. No matter what backup software you decide to use, Joe provides a conceptual walk-through of the entire process, offering basic information for people who've never made a backup before and savvy, real-world suggestions for making the backup process as easy as possible.Deal with special backup needs. You'll learn what to do about certain kinds of data that may require special backup strategies, such as large media archives, frequently changing files that need special versioned backup treatment, and Windows files and volumes hosted on your Mac.Manage your media. Diamonds may be forever, but backup devices are not. Disks fill up. They also wear out. Find advice for handling those realities.Recover lost data. Use your backup to recover lost data successfully in the event of a hard disk crash or other calamity. After all, restoration is what's really important.Bonus! The ebook includes money-saving coupons on ChronoSync, CrashPlan, Data Backup 3, DollyDrive, QRecall, and Retrospect Desktop.Teach This Book: Once your backups are humming along reliably, can we encourage you to help your friends, family, and colleagues improve their backups before they lose data? This ebook links to a downloadable one-page PDF handout and PDF-based slides that you can present on any computer or mobile device screen.

Take Control of Calendar Syncing and Sharing with BusyCal (1.0)

by Joe Kissell

Is there anything more embarrassing than missing an appointment due to a calendar misstep? (Yes. Showing up late, in your pajamas.) Operating calendar software isn't hard, but if you don't understand how calendars sync among devices, how you can share calendars with other people, and how meeting notices work, it's all too easy to fall prey to problems. The goal of this brief ebook, then, is to explain how calendar servers and clients work, when and why to use iCloud or Google Calendar for syncing and sharing, and how to construct a sensible calendar strategy for BusyCal 2 on your Mac--even if you also use other calendar apps or share calendars with people who do. Author Joe Kissell also guides you toward practices that will make your life easier and tries to dissuade you from those that will add unnecessary complication.

Take Control of Customizing Microsoft Office

by Kirk Mcelhearn

Work faster and more efficiently in Microsoft Office X and Office 2004! You know Microsoft Word, Excel, and PowerPoint are powerful, but are you harnessing that power effectively? Microsoft Office expert Kirk McElhearn has distilled years of experience with these programs to explain how to work in Office more quickly and effectively. Learn how to issue your favorite commands faster, whether that means that you put commands on a toolbar for one-click access, stick them on custom menus where you can find them easily, or assign them keyboard shortcuts so that your fingers can do the work. Find tips for arranging toolbars and customizing the Formatting palette. Discover how to insert frequently typed bits of text with ease, and learn to use templates so that you never re-create a frequently used document (such as a monthly report) from scratch again. Kirk will have you working more efficiently than before in no time! Also included: how to navigate toolbars using the keyboard, working with the Word work menu, where Office stores customizations, and more. Bonus! A special appendix lists 20 favorite Office customizations from Macintosh experts. Read this ebook to learn the answers to questions like: How can I access different commands from a toolbar? How do I assign keyboard shortcuts to frequently used commands? How can I revert Word's menus to a Word 5 layout? What's the point of the Word Work menu, and how do I use it? How can I quickly insert frequently typed bits of text? How can I get a list of all keyboard shortcuts assigned in Word? How do I make an Excel template for my monthly report? How do I create a Word template for business letters? Where are my customizations and templates kept, and how do I share them with others? Need Help Buying? Feel free to ask us if you have a question about this ebook. And if you decide not to buy, would you tell us why? This ebook covers Microsoft Office X and Office 2004 for Macintosh; however, much of the information applies to recent versions of Microsoft Office for Windows and to older versions of the software on both platforms. The ebook does not cover writing macros.

Take Control of Dropbox

by Joe Kissell

Sync, link, and share your files! Because Dropbox is so simple to use for basic file syncing, it's easy to forget that you can do far more with it than just sync files between two computers. If that's all you're doing, you're missing out! In this concise ebook, expert Dropbox user Joe Kissell goes beyond the basics, sharing the best practices for using Dropbox on your own or with a group, explaining common mistakes and irreversible settings, describing how to manage mobile devices and Dropbox-savvy apps, and turning you on to unusual uses of Dropbox. Teach This Book! A powerful aspect of Dropbox is sharing files with friends and colleagues, which may make you want to help them use it. To that end, Take Control of Dropbox includes links to a downloadable one-page PDF handout and to an 18-slide PDF presentation that you can show on any computer or mobile device screen.Other useful advice in Take Control of Dropbox includes how to:Recover an accidentally deleted or revised file. You'll find help with a few non-obvious controls and a discussion of the Packrat option for Dropbox Pro users.Work with photos and videos in your Dropbox folder and learn how to share collections of photos with Dropbox's new photo album feature.Use Dropbox to store and automatically sync data used by Dropbox-savvy apps on all of your devices, whether they're running Mac OS X, iOS, Android, Windows, or Linux. You'll get a better idea of what's going on behind the scenes and how to manage app authorizations.Check a few important account-related details to make sure you're set up optimally. These include security settings and methods of getting more storage space.Joe also shares examples of interesting Internet services that can interact with files that you put in your Dropbox folder to publish a blog, automate Web activities, automate your Mac, sync with other cloud services, and even publish a book like this one!

Showing 1,576 through 1,600 of 1,815 results

Help

Select your download format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. For more details, visit the Formats page under the Getting Started tab.

See and hear words read aloud
  • DAISY Text - See words on the screen and hear words being read aloud with the text-to-speech voice installed on your reading tool. Navigate by page, chapter, section, and more. Can also be used in audio-only mode. Compatible with many reading tools, including Bookshare’s free reading tools.
  • DAISY Text with Images - Similar to DAISY Text with the addition of images within the Text. Your reading tool must support images.
  • Read Now with Bookshare Web Reader - Read and see images directly from your Internet browser without downloading! Text-to-speech voicing and word highlighting are available on Google Chrome (extension installation required). Other browsers can be used with limited features. Learn more
Listen to books with audio only
  • DAISY Audio - Listen to books in audio-only mode with the high-quality Kendra voice by Ivona pre-installed. Navigate by page, chapter, section, and more. Must be used with a DAISY Audio compatible reading tool.
  • MP3 - Listen to books in audio-only mode with the high-quality Kendra voice by Ivona pre-installed. Navigate using tracks. Can be used with any MP3 player.
Read in Braille
  • BRF (Braille Ready Format) - Read with any BRF compatible refreshable braille display; navigate using the search or find feature.
  • DAISY Text - Read with any DAISY 3.0 compatible refreshable braille display, navigate by page, chapter, section, and more.
  • Embossed Braille - Use Bookshare’s DAISY Text or BRF formats to generate embossed braille.