Browse Results What Format Should I Choose?

Showing 1,726 through 1,750 of 1,989 results

SUSE Linux: A Complete Guide to Novell's Community Distribution

by Christopher R. Browning

SUSE Linux: A Complete Guide to Novell's Community Distribution will get you up to speed quickly and easily on SUSE, one of the most friendly and usable Linux distributions around. From quick and easy installation to excellent hardware detection and support, it's no wonder SUSE is one of the most highly rated distributions on the planet. According to Novell, SUSE is installed more than 7,000 times every day, an average of one installation every 12 seconds. This book will take you deep into the essential operating system components by presenting them in easy-to-learn modules. From basic installation and configuration through advanced topics such as administration, security, and virtualization, this book captures the important details of how SUSE works--without the fluff that bogs down other books and web sites. Instead, readers get a concise task-based approach to using SUSE as both a desktop and server operating system. In this book, you'll learn how to: Install SUSE and perform basic administrative tasks Share files with other computers Connect to your desktop remotely Set up a web server Set up networking, including Wi-Fi and Bluetooth Tighten security on your SUSE system Monitor for intrusions Manage software and upgrades smoothly Run multiple instances of SUSE on a single machine with Xen Whether you use SUSE Linux from Novell, or the free openSUSE distribution, this book has something for every level of user. The modular, lab-based approach not only shows you how--but also explains why--and gives you the answers you need to get up and running with SUSE Linux. About the author: Chris Brown is a freelance author and trainer in the United Kingdom and Europe. Following Novell's acquisition of SUSE, he taught Linux to Novell's consultants and IT staff and is certified in both Novell's CLP program and Red Hat's RHCE. Chris has a PhD in particle physics from Cambridge.

SVG Essentials

by J. David Eisenberg

Scalable Vector Graphics -- or SVG -- is the new XML-based graphics standard from the W3C that will enable Web documents to be smaller, faster and more interactive. This insightful book takes you through the ins and outs of SVG, from the basics to more complicated features. Whether you're a graphic designer looking for new tools, or a programmer creating and managing graphics, this book provides a solid foundation.

Swing Hacks

by Chris Adamson Joshua Marinacci

Swing Hacks helps Java developers move beyond the basics of Swing, the graphical user interface (GUI) standard since Java 2. If you're a Java developer looking to build enterprise applications with a first-class look and feel, Swing is definitely one skill you need to master. This latest title from O'Reilly is a reference to the cool stuff in Swing. It's about the interesting things you learn over the years--creative, original, even weird hacks--the things that make you say, "I didn't know you could even do that with Swing!" Swing Hacks will show you how to extend Swing's rich component set in advanced and sometimes non-obvious ways. The book touches upon the entire Swing gamut-tables, trees, sliders, spinners, progress bars, internal frames, and text components. Detail is also provided on JTable/JTree, threaded component models, and translucent windows. You'll learn how to filter lists, power-up trees and tables, and add drag-and-drop support. Swing Hacks will show you how to do fun things that will directly enhance your own applications. Some are visual enhancements to make your software look better. Some are functional improvements to make your software do something it couldn't do before. Some are even just plain silly, in print only to prove it could be done. The book will also give you give you a small glimpse of the applications coming in the future. New technology is streaming into the Java community at a blistering rate, and it gives application developers a whole new set of blocks to play with. With its profusion of tips and tricks, Swing Hacks isn't just for the developer who wants to build a better user interface. It's also ideally suited for client-side Java developers who want to deliver polished applications, enthusiasts who want to push Java client application boundaries, and coders who want to bring powerful techniques to their own applications. Whatever your programming needs, Swing Hacks is packed with programming lessons that increase your competency with interface-building tools.

Switching to the Mac: The Missing Manual, Lion Edition

by David Pogue

Ready to move to the Mac? This incomparable guide helps you make a smooth transition. New York Times columnist and Missing Manuals creator David Pogue gets you past three challenges: transferring your stuff, assembling Mac programs so you can do what you did with Windows, and learning your way around Mac OS X. Learning to use a Mac is not a piece of cake, but once you do, the rewards are oh-so-much better. No viruses, worms, or spyware. No questionable firewalls or inefficient permissions. Just a beautiful machine with a thoroughly reliable system. Whether you're using Windows XP or Windows 7, we've got you covered. Transfer your stuff. Moving files from a PC to a Mac is the easy part. This guide gets you through the tricky things: extracting your email, address book, calendar, Web bookmarks, buddy list, desktop pictures, and MP3 files. Re-create your software suite. Big-name programs from Microsoft, Adobe, and others are available in both Mac and Windows versions. But hundreds of other programs are Windows-only. Learn the Macintosh equivalents and how to move data to them. Learn Mac OS X Lion. Once you've moved into the Macintosh mansion, it's time to learn your way around. You're in good hands with the author of Mac OS X: The Missing Manual, the #1 bestselling guide to Mac OS X.

Switching to the Mac: The Missing Manual, Mountain Lion Edition

by David Pogue

Ready to move to the Mac? This incomparable guide helps you make a smooth transition. New York Times columnist and Missing Manuals creator David Pogue gets you past three challenges: transferring your stuff, assembling Mac programs so you can do what you did with Windows, and learning your way around OS X. Learning to use a Mac is not a piece of cake, but once you do, the rewards are oh-so-much better. You won't find questionable firewalls or inefficient permissions. Just a beautiful machine with a thoroughly reliable system. Whether you're using Windows XP or Windows 7, we've got you covered. Transfer your stuff. Moving files from a PC to a Mac is the easy part. This guide gets you through the tricky things: extracting your email, address book, calendar, Web bookmarks, buddy list, desktop pictures, and MP3 files. Re-create your software suite. Big-name programs from Microsoft, Adobe, and others are available in both Mac and Windows versions, but hundreds of other programs are Windows-only. Learn the Macintosh equivalents and how to move data to them. Learn OS X Mountain Lion. Once you've moved into the Macintosh mansion, it's time to learn your way around. You're in good hands with the author of Mac OS X: The Missing Manual, the #1 bestselling guide to OS X.<P> Advisory: Bookshare has learned that this book offers only partial accessibility. We have kept it in the collection because it is useful for some of our members. To explore further access options with us, please contact us through the Book Quality link on the right sidebar. Benetech is actively working on projects to improve accessibility issues such as these.

Switching to the Mac: The Missing Manual, Tiger Edition

by David Pogue Adam Goldstein

It's little wonder that longtime Windows users are migrating in droves to the new Mac. They're fed up with the virus-prone Windows way of life, and they're lured by Apple's well-deserved reputation for producing great all-around computers that are reliable, user-friendly, well designed, and now--with the $500 Mac mini--extremely affordable, too. Whether you're drawn to the Mac's stability, its stunning digital media suite, or the fact that a whole computer can look and feel as slick as your iPod, you can quickly and easily become a Mac convert. But consider yourself warned: a Mac isn't just a Windows machine in a prettier box; it's a whole different animal and a whole new computing experience. If you're contemplating--or have already made--the switch from a Windows PC to a Mac, you need Switching to the Mac: The Missing Manual, Tiger Edition . This incomparable guide delivers what Apple doesn't: everything you need to know to successfully and painlessly move to a Mac. Missing Manual series creator and bestselling author David Pogue teams up with 17-year-old whiz kid and founder of GoldfishSoft (www.goldfishsoft.com) Adam Goldstein to cover every aspect of switching to a Mac--things like transferring email, files, and addresses from a PC to a Mac; getting acquainted with the Mac's interface; adapting to Mac versions of familiar programs (including Microsoft Office); setting up a network to share files with PCs and Macs; and using the printers, scanners, and other peripherals you already own. Covering the latest in Mac OS X v.10.4 "Tiger," Switching to the Mac: The Missing Manual, Tiger Edition explains the hundreds of innovative new features to the Mac OS and how you can understand and make the very most of each. Whether you're a novice or a power user, Switching to the Mac: The Missing Manual, Tiger Edition , teaches you how to smoothly and seamlessly replace (or supplement) your Windows machine--in a refreshingly funny and down-to-earth style--with a mighty Mac.

Switching to VoIP

by Theodore Wallingford

More and more businesses today have their receive phone service through Internet instead of local phone company lines. Many businesses are also using their internal local and wide-area network infrastructure to replace legacy enterprise telephone networks. This migration to a single network carrying voice and data is called convergence, and it's revolutionizing the world of telecommunications by slashing costs and empowering users. The technology of families driving this convergence is called VoIP, or Voice over IP. VoIP has advanced Internet-based telephony a viable solution, piquing the interest of companies small and large. The primary reason for migrating to VoIP is cost, as it equalizes the costs of long distance calls, local calls, and e-mails to fractions of a penny per use. But the real enterprise turn-on is how VoIP empowers businesses to mold and customize telecom and datacom solutions using a single, cohesive networking platform. These business drivers are so compelling that legacy telephony is going the way of the dinosaur, yielding to Voice over IP as the dominant enterprise communications paradigm. Developed from real-world experience by a senior developer, O'Reilly's Switching to VoIP provides solutions for the most common VoIP migration challenges. So if you're a network professional who is migrating from a traditional telephony system to a modern, feature-rich network, this book is a must-have. You'll discover the strengths and weaknesses of circuit-switched and packet-switched networks, how VoIP systems impact network infrastructure, as well as solutions for common challenges involved with IP voice migrations. Among the challenges discussed and projects presented: building a softPBX configuring IP phones ensuring quality of service scalability standards-compliance topological considerations coordinating a complete system ?switchover? migrating applications like voicemail and directory services retro-interfacing to traditional telephony supporting mobile users security and survivability dealing with the challenges of NAT To help you grasp the core principles at work, Switching to VoIP uses a combination of strategy and hands-on "how-to" that introduce VoIP routers and media gateways, various makes of IP telephone equipment, legacy analog phones, IPTables and Linux firewalls, and the Asterisk open source PBX software by Digium. You'll learn how to build an IP-based or legacy-compatible phone system and voicemail system complete with e-mail integration while becoming familiar with VoIP protocols and devices. Switching to VoIP remains vendor-neutral and advocates standards, not brands. Some of the standards explored include: SIP H.323, SCCP, and IAX Voice codecs 802.3af Type of Service, IP precedence, DiffServ, and RSVP 802.1a/b/g WLAN If VoIP has your attention, like so many others, then Switching to VoIP will help you build your own system, install it, and begin making calls. It's the only thing left between you and a modern telecom network.

SWT: A Developer's Notebook

by Tim Hatton

In typical Developer's Notebook style, you'll learn how to take SWT out for a spin, make it work for you,and turn it upside down, all without wasted words or space. Each lab in this notebook details a specific task; you can read from the first page to the last, look up just what you need to know, and even squeeze this book into your laptop bag as a quick reference when you forget how to create a multi-tabbed view.

Syngress IT Security Project Management Handbook

by Susan Snedaker

The First and Last Word on Managing IT Security Projects As the late management guru Peter Drucker once said, "Plans are only good intentions unless they immediately degenerate into hard work." The intent of this book is not to lead you through long, arduous planning processes while hackers are stealing your network out from under you. The intent is to provide you with effective network security planning tools so that you can "degenerate into hard work" as quickly as possible to keep your network secure with the least amount of effort. Rather than losing sleep at night wondering who's wandering around your network in the dark, you can create a comprehensive security solution for your company that will meet your security needs today and will allow you to address new security requirements in the future. This book is designed to help you do exactly that. Analyze the Cost of Prevention Versus Remediation How to determine if preventing a security breach is less costly than fixing it once it occurs. Identify the Right Project Management Team Determine who will be affected and make certain they are on board from the start. Monitor IT Security Project Quality Many companies must comply with specific monitoring requirements to meet industry or governmental regulations. Create a Work Breakdown Structure (WBS) Be sure that your WBS tasks are at the same level by keeping the level of detail consistent. Create Reliable Documentation Your documentation should be well defined and completed in as near real time as possible. Implement Individual Security Analysis Programs (ISAPs) Testing requires an active "push" against security areas to ensure they don't collapse. Close the Issues Log, Change Requests, and Error Reports Addressing known issues in a reasonable manner and documenting those resolutions are important elements of reducing risk. Review Legal Standards Relevant to Your Project Failure to understand the legal implications may leave your company at substantial legal risk. Walk Through a Complete Plan Includes a step-by-step security project plan for a security assessment and audit project

Synthetic Worlds: The Business and Culture of Online Games

by Edward Castronova

Castronova offers the first comprehensive look at the online game industry, exploring its implications for business and culture alike. He starts with the players, giving us a revealing look into the everyday lives of the gamers--outlining what they do in their synthetic worlds and why.

System Performance Tuning, 2nd Edition

by Mike Loukides Gian-Paolo D. Musumeci

System Performance Tuning answers one of the most fundamental questions you can ask about your computer: How can I get it to do more work without buying more hardware? In the current economic downturn, performance tuning takes on a new importance. It allows system administrators to make the best use of existing systems and minimize the purchase of new equipment. Well-tuned systems save money and time that would otherwise be wasted dealing with slowdowns and errors. Performance tuning always involves compromises; unless system administrators know what the compromises are, they can't make intelligent decisions. Tuning is an essential skill for system administrators who face the problem of adapting the speed of a computer system to the speed requirements imposed by the real world. It requires a detailed understanding of the inner workings of the computer and its architecture. System Performance Tuning covers two distinct areas: performance tuning, or the art of increasing performance for a specific application, and capacity planning, or deciding what hardware best fulfills a given role. Underpinning both subjects is the science of computer architecture. This book focuses on the operating system, the underlying hardware, and their interactions. Topics covered include: Real and perceived performance problems, introducing capacity planning and performance monitoring (highlighting their strengths and weaknesses). An integrated description of all the major tools at a system administrator's disposal for tracking down system performance problems. Background on modern memory handling techniques, including the memory-caching filesystem implementations in Solaris and AIX. Updated sections on memory conservation and computing memory requirements. In depth discussion of disk interfaces, bandwidth capacity considerations, and RAID systems. Comprehensive discussion of NFS and greatly expanded discussion of networking. Workload management and code tuning. Special topics such as tuning Web servers for various types of content delivery and developments in cross-machine parallel computing For system administrators who want a hands-on introduction to system performance, this is the book to recommend.

The Systematic Design of Instruction (Sixth Edition)

by Walter O. Dick Lou Carey James O. Carey

This classic text introduces students to the fundamentals of instructional design and helps them learn the concepts and procedures for designing, developing, and evaluating instruction for all delivery formats. The new edition builds upon the foundation of previous editions with clear discussions on the impact of critical new theories, new technologies, and the Internet. The book addresses current design processes used in instructional settings and delivery systems across many areas of curriculum and business, including Internet-based Distance Education. Hallmark Features *The text clearly describes and models the instructional design process as it is practiced in educational and business settings, allowing students easy transfer of important topics. *The conceptual base for each step in the instructional design model is clearly defined and described in an accessible manner.*Application of and decision-making about instructional design concepts are illustrated through a serial case study example carried through the steps of the design model in each chapter of the book. *Opportunities are provided for readers to apply new concepts through practice and feedback activities at the end of each chapter. *Up-to-date references and recommended readings with annotations allow students to further explore the concepts presented in the text. *This new edition uses course management technology to illustrate design. The new CourseCompass website includes: goals and objectives for each step in the model, illustrations of preinstructional materials, rubrics for evaluating products for each step in the model, concept quizzes, and much more.

Systematics as Cyberscience: Computers, Change, and Continuity in Science

by Christine Hine

An exploration of the use of information and communication technologies by biologists working in systematics (taxonomy) and the dynamics of change and continuity with past practices in the development of systematics as a cyberscience.

Systems, Experts and Computers: The Systems Approach in Management and Engineering, World War II and After

by Agatha C. Hughes Thomas P. Hughes

After World War II, a systems approach to solving complex problems and managing complex systems came into vogue among engineers, scientists, and managers, fostered in part by the diffusion of digital computing power.

T1: A Survival Guide

by Matthew Gast

This practical, applied reference to T1 for system and network administrators brings together in one place the information you need to set up, test, and troubleshoot T1. You'll learn what components you need to build a T1 line; how the components interact to transmit data; how to adapt the T1 to work with data networks using standardized link layer protocols; troubleshooting strategies; and working with vendors.

Tablet PC Quick Reference

by Microsoft Corporation

<div xmlns="http://www.w3.org/1999/xhtml"><p>In a meeting, in the hallway, or on the run\u2014achieve ultimate mobility with the TABLET PC QUICK REFERENCE. This expert guide shows how to get up and running faster with the Tablet\u2019s digital pen, Input Panel, Windows\xae Journal, speech recognition, and more.</p></div>

Take Control of 1Password

by Joe Kissell

Speed through Web logins with 1Password 4!Remembering and entering Web passwords is both difficult and insecure, but it doesn't have to be that way, thanks to 1Password, the popular password manager from AgileBits. In this ebook, Joe Kissell brings years of real-world 1Password experience into play--plus many hours with the 1Password 4 for Mac beta--to explain not only how to create, edit, and enter Web login data easily, but also how to autofill contact and credit card information when shopping online, audit your passwords and generate better ones, and share your passwords with key people and among multiple devices. Joe focuses on 1Password 4 for the Mac, but he also provides details and directions for the iOS, Windows, and Android versions of 1Password.You'll find expert advice on these topics:Meet 1Password: Set your master passcode and make first-run configuration decisions. Explore usage strategies for 1Password on your Mac, PC, iOS device, or Android handheld, and understand the different components of the software on the different platforms. Get lots of ideas for how to share your vault (or vaults!) among your devices and with other people.Master logins: In 1Password, a typical login contains a set of credentials used to sign in to a Web site. Find out how to create logins, sort them, search them, tag them, delete them, and more. You'll especially find help with editing logins. For example, if you change a password from dragon7 to eatsevendragonsforlunchatyahoo, you'll want to incorporate that into its login. Or, use 1Password's password generator to come up with complex passwords, like dGx7Crve3WucELF#s.Understand password security: Get guidance on what makes for a good password, and read Joe's important Password Dos and Don'ts. An advanced topic later in the ebook covers how to perform a security audit in order to improve poor passwords quickly. (For Joe's full advice on passwords, read Take Control of Your Passwords.)Go beyond Web logins: For a lot of people, a primary point of 1Password is to speed the process of signing in to Web sites. But 1Password can do much more. Learn about storing and autofilling contact information (for more than one identity, even), and your credit card number and security code. You'll also find advice on storing passwords for password-protected files and encrypted disk images, plus ideas for keeping track of confidential files, private diary entries, scans of important cards or documents, and more.You'll also discover the answers to key questions, including: What are the main changes between 1Password 3 and 1Password 4?In addition to 1Password, should I use my Web browser's password, contact, or credit card autofill feature? What about Apple's iCloud Keychain?What is the fastest way to get 1Password to sign me in to a Web site?My login item used to sign me in, but it stopped working. What should I do?I made a long, random password for my bank account, but it wasn't saved in the login item! Where can I find it?How can I use one username and password with multiple Web sites, like one Apple ID for both iCloud and the online Apple Store?What if I need to access my 1Password data from another person's computer?How can I speed up Web logins and filling in shopping cart info with 1Password in iOS or Android?Is it true that I can initiate 1Password login items from keyboard launcher utilities like LaunchBar, Alfred, and Quicksilver? (Hint: the answer is yes!)

Take Control of Apple Mail

by Joe Kissell

Master Mail in Mavericks and iOS 7! Email is essential for everything from work to shopping to keeping in touch with family. Could you get anything done without it? In this book, email expert Joe Kissell helps you make sure Apple Mail won't leave you in the lurch, providing essential setup, usage, and troubleshooting advice, whether you use Gmail, iCloud, Exchange, or IMAP -- or more than one -- in both OS X 10.9 Mavericks on your Mac and iOS 7 on your iPad, iPhone, or iPod touch.Along the way, Joe explains core concepts like special IMAP mailboxes and email archiving, reveals Mail's hidden interface elements, and offers tips on customizing Mail to your preferences (including the best power-user plugins for Mail on the Mac). You'll also learn how to find that message in the haystack, figure out how digital signatures and encryption work in Mail, and uncover solutions to numerous common problems. Perhaps most important, Joe shares his strategy for avoiding email overload; the article where he first introduced it won American Business Media's Neal Award for Best How-To Article.Using the fully linked table of contents, Quick Start page, or other hot links in the ebook, you'll quickly find the essential information that's most important to you, including: * Key changes in Mail for Mavericks * Interesting new features in Mail for iOS 7 * Setting Mail's Junk Mail filter correctly and other tips for defeating spam * Understanding special mailboxes like Sent, Drafts, and Junk * Addressing email to multiple recipients -- and to smart groups * Using notifications to manage incoming messages * Turning on the much-loved classic window arrangement * Customizing the Mail sidebar, toolbar, message header interface, and more * Using search tokens AND understanding Boolean searches * Joe's suggested smart mailboxes * Taking charge of email organization with rules and other measures * Keeping attachments problem-free * 12 things you should know about iOS Mail * Fixing problems: receiving, sending, logging in, bad mailboxes, and more * Mail plugins that will improve your Mail experience * How to decide if you should encrypt your email * Detailed, real-world steps for signing and encrypting email

Take Control of Automating Your Mac

by Joe Kissell

Find shortcuts that make tedious tasks quick, accurate, and repeatable!If you use copy and paste, you're eliminating unnecessary retyping and possible typos. But did you realize that you could be using dozens of additional shortcuts that make tedious tasks quick, accurate, and repeatable? In this essential title, Joe Kissell shines a light on OS X's many built-in shortcuts and provides sweeping coverage of the utilities that go even further.You don't need to be a programmer -- or even particularly geeky -- to automate your Mac. Everyone uses copy and paste, and most of what Joe explains can be used by anyone, from novice to expert, to make their work quicker, more accurate, and more easily repeated when needed. Nor is specialized software necessary, since OS X has oodles of built-in automation features like keyboard shortcuts, configurable gestures, and automatic launching of key apps. But clever Macintosh developers have created brilliant utilities that go far beyond OS X's features, and Joe discusses the key players, devotes a chapter to Keyboard Maestro (which gives you control over nearly any task on your Mac), and delves into the included automation capabilities in Microsoft Office and Nisus Writer Pro.In short, Take Control of Automating Your Mac will:Show you lots of tools and techniques for automating your Mac.Offer concrete examples you can use as is or adapt to your needs.Inspire you with extensive lists of further possibilities.We've included discounts totalling over $60 on eight of the key apps Joe covers: 20% or 30% off on Keyboard Maestro, LaunchBar, Hazel, Nisus Writer Pro, TextExpander, TextSoap, TypeIt4Me, and Typinator -- look for coupons at the back of the ebook!Take Control of Automating Your Mac has chapters about how to:Develop an automator's mindsetUse OS X's built-in automation featuresTake full advantage of input devices to save clicksAutomate text expansion for faster, more consistent typingControl the Finder with a launcher and by organizing files with HazelSupercharge your clipboard to remember and reformat previous copiesWrite macros in Microsoft Office and Nisus Writer ProCreate rules to file email automatically in Apple Mail and OutlookLog in to Web sites faster with a password managerAutomate cloud services with IFTTT and ZapierSet up automatic backup and syncingGet started with Automator and AppleScriptControl nearly anything on your Mac with Keyboard MaestroThis ebook was written for users of 10.9 Mavericks, but many of the functions described work similarly in older (and upcoming) versions of OS X.

Take Control of Backing Up Your Mac

by Joe Kissell

Set up a rock-solid backup strategy so that you can restore quickly and completely, no matter what catastrophe arises.Read along as backup guru Joe Kissell helps you understand the three components of a solid backup strategy, implement that strategy in a way that meets your specific needs, and understand the hows and whys of what you are doing, taking you far beyond the limited security of turning on Time Machine or copying a few files to a flash drive or cloud service. You'll also find details on how to test your backup system, and on how to restore from backup. Whether you're running Mac OS X 10.7 Lion or 10.8 Mountain Lion, you'll soon have a reliable, up-to-date backup system.Although the 201-page ebook is organized so you can start backing up without reading every page, the full ebook will teach you to:Design a reliable backup system. If you're developing a new backup system, you'll learn how to make it not only thorough, ensuring that all your data is safe, but also easy to manage and appropriate for your situation. If you're assessing an existing backup system, Joe discusses how to evaluate it and offers guidance for improving and modernizing it.Talk like an expert. You'll learn the meaning of terms like "versioned backups," "delta encoding," "push" and "pull" backups, "duplicates," "server," "client," "incremental," "hard link," "mirroring," and "snapshot."Choose backup software. Consider the pros and cons of Apple's free Time Machine and determine whether it's a good match for you--or if you should consider a different program with better features for your needs. You'll learn about 14 key features to look for in backup apps and find overviews and tips for 8 noteworthy products (an online appendix covers nearly 100 options), plus several suggestions for online backups. You'll also get Joe's recommendations to help you sort through the possibilities.Shop for hardware. You'll discover the pros and cons of backup media options such as hard drives (with USB, FireWire, eSATA, or Thunderbolt interfaces--and with or without full-disk encryption), flash drives, optical media, tape drives, RAIDs, Drobo storage devices, Time Capsules, and NAS and SAN devices.Operate Time Machine. Find out what goes on beneath Time Machine's simple surface, and how best to make use of Apple's built-in backup system, including how local snapshots work when your Time Machine volume isn't available, and how to encrypt a Time Machine backup.Make backups. No matter what backup software you decide to use, Joe provides a conceptual walk-through of the entire process, offering basic information for people who've never made a backup before and savvy, real-world suggestions for making the backup process as easy as possible.Deal with special backup needs. You'll learn what to do about certain kinds of data that may require special backup strategies, such as large media archives, frequently changing files that need special versioned backup treatment, and Windows files and volumes hosted on your Mac.Manage your media. Diamonds may be forever, but backup devices are not. Disks fill up. They also wear out. Find advice for handling those realities.Recover lost data. Use your backup to recover lost data successfully in the event of a hard disk crash or other calamity. After all, restoration is what's really important.Bonus! The ebook includes money-saving coupons on ChronoSync, CrashPlan, Data Backup 3, DollyDrive, QRecall, and Retrospect Desktop.Teach This Book: Once your backups are humming along reliably, can we encourage you to help your friends, family, and colleagues improve their backups before they lose data? This ebook links to a downloadable one-page PDF handout and PDF-based slides that you can present on any computer or mobile device screen.

Take Control of Calendar Syncing and Sharing with BusyCal (1.0)

by Joe Kissell

Is there anything more embarrassing than missing an appointment due to a calendar misstep? (Yes. Showing up late, in your pajamas.) Operating calendar software isn't hard, but if you don't understand how calendars sync among devices, how you can share calendars with other people, and how meeting notices work, it's all too easy to fall prey to problems. The goal of this brief ebook, then, is to explain how calendar servers and clients work, when and why to use iCloud or Google Calendar for syncing and sharing, and how to construct a sensible calendar strategy for BusyCal 2 on your Mac--even if you also use other calendar apps or share calendars with people who do. Author Joe Kissell also guides you toward practices that will make your life easier and tries to dissuade you from those that will add unnecessary complication.

Take Control of Customizing Microsoft Office

by Kirk Mcelhearn

Work faster and more efficiently in Microsoft Office X and Office 2004! You know Microsoft Word, Excel, and PowerPoint are powerful, but are you harnessing that power effectively? Microsoft Office expert Kirk McElhearn has distilled years of experience with these programs to explain how to work in Office more quickly and effectively. Learn how to issue your favorite commands faster, whether that means that you put commands on a toolbar for one-click access, stick them on custom menus where you can find them easily, or assign them keyboard shortcuts so that your fingers can do the work. Find tips for arranging toolbars and customizing the Formatting palette. Discover how to insert frequently typed bits of text with ease, and learn to use templates so that you never re-create a frequently used document (such as a monthly report) from scratch again. Kirk will have you working more efficiently than before in no time! Also included: how to navigate toolbars using the keyboard, working with the Word work menu, where Office stores customizations, and more. Bonus! A special appendix lists 20 favorite Office customizations from Macintosh experts. Read this ebook to learn the answers to questions like: How can I access different commands from a toolbar? How do I assign keyboard shortcuts to frequently used commands? How can I revert Word's menus to a Word 5 layout? What's the point of the Word Work menu, and how do I use it? How can I quickly insert frequently typed bits of text? How can I get a list of all keyboard shortcuts assigned in Word? How do I make an Excel template for my monthly report? How do I create a Word template for business letters? Where are my customizations and templates kept, and how do I share them with others? Need Help Buying? Feel free to ask us if you have a question about this ebook. And if you decide not to buy, would you tell us why? This ebook covers Microsoft Office X and Office 2004 for Macintosh; however, much of the information applies to recent versions of Microsoft Office for Windows and to older versions of the software on both platforms. The ebook does not cover writing macros.

Take Control of Dropbox

by Joe Kissell

Sync, link, and share your files! Because Dropbox is so simple to use for basic file syncing, it's easy to forget that you can do far more with it than just sync files between two computers. If that's all you're doing, you're missing out! In this concise ebook, expert Dropbox user Joe Kissell goes beyond the basics, sharing the best practices for using Dropbox on your own or with a group, explaining common mistakes and irreversible settings, describing how to manage mobile devices and Dropbox-savvy apps, and turning you on to unusual uses of Dropbox. Teach This Book! A powerful aspect of Dropbox is sharing files with friends and colleagues, which may make you want to help them use it. To that end, Take Control of Dropbox includes links to a downloadable one-page PDF handout and to an 18-slide PDF presentation that you can show on any computer or mobile device screen.Other useful advice in Take Control of Dropbox includes how to:Recover an accidentally deleted or revised file. You'll find help with a few non-obvious controls and a discussion of the Packrat option for Dropbox Pro users.Work with photos and videos in your Dropbox folder and learn how to share collections of photos with Dropbox's new photo album feature.Use Dropbox to store and automatically sync data used by Dropbox-savvy apps on all of your devices, whether they're running Mac OS X, iOS, Android, Windows, or Linux. You'll get a better idea of what's going on behind the scenes and how to manage app authorizations.Check a few important account-related details to make sure you're set up optimally. These include security settings and methods of getting more storage space.Joe also shares examples of interesting Internet services that can interact with files that you put in your Dropbox folder to publish a blog, automate Web activities, automate your Mac, sync with other cloud services, and even publish a book like this one!

Take Control of FileVault

by Joe Kissell

Protect your Mac's data in the event of theft with Apple's FileVault!If your Mac were stolen, would you worry about the thief seeing your email, photos, financial data, and other sensitive information? OS X's built-in FileVault encryption technology ensures that your Mac's contents are safe from prying eyes, but if you're hesitant to entrust your data to an algorithm before you understand how FileVault works, this book will dispel any misconceptions, answer your questions, and get you running FileVault with confidence.Security expert Joe Kissell begins by demystifying FileVault in a quick FAQ that explains, among other things, how it is that you can work with your startup drive normally even though all the data on it is encrypted. After the FAQ, Joe provides detailed steps for activating and using FileVault on both your startup volume and external drives. He also explains how FileVault interacts with your backups and how to use Find My Mac (because, remember, the point of FileVault is to protect your data in the event of theft) once you've turned on FileVault.Additional topics include making and using encrypted disk images, third-party software that can encrypt just a single file or folder, and accessing special FileVault features from the command line.FileVault facts and features that you'll master include:Essential tips for protecting external drives with FileVaultPros and cons of encrypting the backup of a FileVault-encrypted driveImportant steps for safeguarding encrypted drives from motivated thievesWhether your data is safe when your Mac is sleepingWhether your data is safe from other logged-in users on the same MacPros and cons of letting Apple store your recovery keyHow to avoid panicking if you forget your FileVault passwordFileVault and Disk Utility features found only on the command lineThis book covers FileVault 2, which was introduced in 10.7 Lion and is far better than, and completely different from, the original version of FileVault (now called Legacy FileVault). Everything in this book works with 10.9 Mavericks. A few minor things have changed over the years, but anyone with 10.7 Lion or 10.8 Mountain Lion should also find the book useful. It appears that 10.10 Yosemite, slated for release later this year, will change very little about FileVault.

Take Control of LaunchBar

by Kirk Mcelhearn

Let LaunchBar's superpowers save you from a lifetime of Mac drudgery! Join Mac expert Kirk McElhearn, and learn how to use LaunchBar, from Objective Development, to carry out nearly any Mac task more efficiently. To help you develop a mental map of all that LaunchBar can do, Kirk explains LaunchBar in the context of its five superpowers -- key LaunchBar techniques that no Mac user should be without!Abbreviation search. The primary way you select things in LaunchBar is by typing a few letters associated with the item you want to find. LaunchBar is smart (so the abbreviation doesn't have to be obvious) and learns from what you type (in case it guessed wrong the first time).Browsing. Sometimes you don't know what you want until you see it. Abbreviation search won't help there, but you can browse folders, recent documents for an app, clipboard history, snippets, and more.Sub-search. Too many results in a list to browse? Try a sub-search, which is an abbreviation search limited to a list of search results.Send To. Want to open a PDF in PDFpen rather than Preview? Or attach a document to a new email message? You can send anything on LaunchBar's bar to another application, folder, action, or service.Instant Send. For those who want to save the most time, Instant Send is the fastest way to put a selected file or bit of text on the bar, ready to open in another app, move to a folder, send to a Google search, look up in Dictionary, and more.Don't worry about remembering all this -- a one-page cheat sheet in the book will jog your memory until LaunchBar has worked its way into your fingertips.Consider two examples:Example 1: The most beloved LaunchBar function is to access apps quickly -- especially apps that you don't keep in the Dock. Just invoke LaunchBar (with a keyboard shortcut of your choosing), type a quick abbreviation -- whatever seems natural to you -- and press Return. (Or, take the express route with LaunchBar's handy Instant Open.) LaunchBar doesn't require predefined abbreviations; instead, it adapts to you! This method of accessing an app uses the Abbreviation Search, superpower #1.Example 2: Once you've become accustomed to the ease of accessing any app, you can start applying abbreviation search to other tasks and begin to unleash LaunchBar's other four superpowers. One example is to employ superpower #5, Instant Send, to file photos: select a photo's file icon in the Finder, hold down the key you use to invoke LaunchBar for an extra second to put the file on the bar, select the Add to iPhoto action, and press Return to send the photo to iPhoto. We could go on forever with our favorite examples: pasting the third item back from the clipboard history, moving a file into a deeply nested folder, creating calendar events, skipping to the next track in iTunes, running Terminal commands, looking up terms in Wikipedia, counting the characters in selected text, tweeting a quote from an article, finding your uncle's phone number, and so on. To learn how do all this, and more, read the ebook!

Showing 1,726 through 1,750 of 1,989 results

Help

Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the "Using Bookshare" page in the Help Center.

Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.

  • Bookshare Web Reader - a customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
  • DAISY (Digital Accessible Information System) - a digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ‘DAISY Text with Images’.
  • BRF (Braille Refreshable Format) - digital Braille for use with refreshable Braille devices and Braille embossers.
  • MP3 (Mpeg audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
  • DAISY Audio - Similar to the Daisy 3.0 option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivona's Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.