Browse Results What Format Should I Choose?

Showing 1,576 through 1,600 of 12,051 results

CDO & MAPI Programming with Visual Basic

by Dave Grundgeiger

Computers and devices are more connected now than ever before. Why? Because the humans who use those computers need to collaborate. We need to share information, and we need to do it quickly, without regard to the physical distance that separates us. Corporate solution developers now more than ever have the opportunity and responsibility to enable people to communicate in ways never before possible. CDO and MAPI Programming with Visual Basic: Developing Mail and Messaging Applications dives deep into Microsoft's Collaboration Data Objects (CDO) and the Messaging Application Programming Interface (MAPI), then moves into succinct explanations of the types of useful messaging applications that can be written in Visual Basic. Microsoft has given the Visual Basic community Collaboration Data Objects (CDO)--a technology that goes far beyond simple email, fully into the realm of information workflow. CDO enables Visual Basic applications to exchange not only classic email, but in fact any information in a straightforward and easy way. The Internet--sometimes seen as a barrier by developers--is turned into an open pipe, ready to take your application's data around the world. Routing documents and building email list servers is just the beginning. Harness the power of worldwide communication in your everyday business applications. MAPI is the cornerstone of messaging on the Windows platforms, and profoundly influences the way you will write your collaboration applications. Understanding this technology lays the foundation for adding effective collaboration capabilities to your own applications. CDO and MAPI Programming with Visual Basic: Developing Mail and Messaging Applications fills a gap in an exciting and relatively young, yet popular, technology that lacks adequate documentation.

CEH: Certified Ethical Hacker Version 8 Study Guide

by Sean-Philip Oriyano

Prepare for the new Certified Ethical Hacker version 8 examwith this Sybex guideSecurity professionals remain in high demand. The CertifiedEthical Hacker is a one-of-a-kind certification designed to givethe candidate a look inside the mind of a hacker. This study guideprovides a concise, easy-to-follow approach that covers all of theexam objectives and includes numerous examples and hands-onexercises. Coverage includes cryptography, footprinting andreconnaissance, scanning networks, enumeration of services, gainingaccess to a system, Trojans, viruses, worms, covert channels, andmuch more. A companion website includes additional study tools,Including practice exam and chapter review questions and electronicflashcards.Security remains the fastest growing segment of IT, and CEHcertification provides unique skillsThe CEH also satisfies the Department of Defense's 8570Directive, which requires all Information Assurance governmentpositions to hold one of the approved certificationsThis Sybex study guide is perfect for candidates studying ontheir own as well as those who are taking the CEHv8 courseCovers all the exam objectives with an easy-to-followapproachCompanion website includes practice exam questions, flashcards,and a searchable Glossary of key termsCEHv8: Certified Ethical Hacker Version 8 Study Guide isthe book you need when you're ready to tackle this challengingexamAlso available as a set, Etical Hacking and Web Hacking Set,9781119072171 with The Web Application Hacker's Handbook:Finding and Exploiting Security Flaws, 2nd Edition.

CEH v9: Certified Ethical Hacker Version 9 Practice Tests

by Raymond Blockmon

Master CEH v9 and identify your weak spots CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain the confidence--and skills--you need to pass. These tests cover all five sections of the exam, allowing you to test your knowledge of Assessment; Security; Tools and Systems; Procedures and Methodology; and Regulation, Policy, and Ethics. Coverage aligns with CEH version 9, including material on cloud, tablet, and mobile phone security and attacks, as well as the latest vulnerabilities including Heartbleed, shellshock, and Poodle. The exams are designed to familiarize CEH candidates with the test format, allowing them to become more comfortable reading a Wireshark .pcap file or viewing visual depictions of network attacks. The ideal companion for the Sybex CEH v9 Study Guide, this book is an invaluable tool for anyone aspiring to this highly-regarded certification. Offered by the International Council of Electronic Commerce Consultants, the Certified Ethical Hacker certification is unique in the penetration testing sphere, and requires preparation specific to the CEH exam more than general IT security knowledge. This book of practice tests help you steer your study where it needs to go by giving you a glimpse of exam day while there's still time to prepare. Practice all five sections of the CEH v9 exam Test your knowledge of security, tools, procedures, and regulations Gauge your understanding of new vulnerabilities and threats Master the material well in advance of exam day By getting inside the mind of a hacker, you gain a one-of-a-kind perspective that dramatically boosts your marketability and advancement potential. If you're ready to attempt this unique certification, the CEH: Certified Ethical Hacker Version 9 Practice Tests are the major preparation tool you should not be without.

CEH v9: Certified Ethical Hacker Version 9 Study Guide

by Oriyano

The ultimate preparation guide for the unique CEH exam. The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise, to-the-point explanations and an easy-to-follow approach to the material. Covering all sections of the exam, the discussion highlights essential topics like intrusion detection, DDoS attacks, buffer overflows, and malware creation in detail, and puts the concepts into the context of real-world scenarios. Each chapter is mapped to the corresponding exam objective for easy reference, and the Exam Essentials feature helps you identify areas in need of further study. You also get access to online study tools including chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms to help you ensure full mastery of the exam material. The Certified Ethical Hacker is one-of-a-kind in the cybersecurity sphere, allowing you to delve into the mind of a hacker for a unique perspective into penetration testing. This guide is your ideal exam preparation resource, with specific coverage of all CEH objectives and plenty of practice material. Review all CEH v9 topics systematically Reinforce critical skills with hands-on exercises Learn how concepts apply in real-world scenarios Identify key proficiencies prior to the exam The CEH certification puts you in professional demand, and satisfies the Department of Defense's 8570 Directive for all Information Assurance government positions. Not only is it a highly-regarded credential, but it's also an expensive exam--making the stakes even higher on exam day. The CEH v9: Certified Ethical Hacker Version 9 Study Guide gives you the intense preparation you need to pass with flying colors.

The Celebrity Tweet Directory

by Jeanne Harris

Tweet along with your favorite celebs! Divided by category with celebrities listed in alphabetical order so you can easily find your favorite celeb, The Celebrity Tweet Directory tweets you to conversations with hundreds of well-known actors, comedians, singers, politicians, sports figures, and more. With this handy guide, you can flutter into the world of celebrity chatter and experience how they reveal themselves in a way you don't see anywhere else. With this portable directory, you'll quickly and easily discover what's really happening in Hollywood, on Wall Street, or in Washington, all while following your favorite celeb. In addition, the helpful directory weeds out any fake celebrity twitter accounts, providing only real Twitter handles, saving you the hassle and time of sifting through phony accounts. Features a helpful celebrity directory so you can find your favorite celeb and enjoy sweet tweets from the hottest actors, singers, politicians, sports figures, and more Weeds out any phony celebrity accounts, saving you the hassle of sorting through fake accounts Helps keep you in the know with celebrities on the go, so you're up on what's happening everywhere from Beverly Hills to Capitol Hill Be the first to hear celebrity buzz and get the chic tweets from your fave celebs with The Celebrity Tweet Directory!

Cell

by Robin Cook

George Wilson, M. D. , a radiology resident in Los Angeles, is about to enter a profession on the brink of an enormous paradigm shift, foreshadowing a vastly different role for doctors everywhere. The smartphone is poised to take on a new role in medicine, no longer as a mere medical app but rather as a fully customizable personal physician capable of diagnosing and treating even better than the real thing. It is called iDoc. George's initial collision with this incredible innovation is devastating. He awakens one morning to find his fiancée dead in bed alongside him, not long after she participated in an iDoc beta test. Then several of his patients die after undergoing imaging procedures. All of them had been part of the same beta test. Is it possible that iDoc is being subverted by hackers-and that the U. S. government is involved in a cover-up? Despite threats to both his career and his freedom, George relentlessly seeks the truth, knowing that if he's right, the consequences could be lethal.

Cell Phone Safety

by Frank W. Baker Kathy Allen

If you get a text from a stranger, do you know what to do? Don't worry if you don't. This book is here to help! Learn tech-savvy ways to keep your cell phone a safe zone without taking away all the fun!

Celtx: Open Source Screenwriting Beginner's Guide

by Ralph Roberts

This is a beginner's guide - a hand-holding fun ride with step-by-step instructions and illustrative screenshots.If you want to write a professional script or screenplay using the open source tool Celtx, this book is for you. You need not have any previous knowledge of Celtx or any other writing software.

CentOS 6 Linux Server Cookbook

by Jonathan Hobson

Presented in a step by step, easy to read tutorial style, this book presents the reader with real world solutions to every aspect of CentOS 6. "CentOS 6 Linux Server Cookbook" is for those professionals, students and enthusiasts who want a down-to-earth or hands-on approach to installing, configuring and running a Centos 6 server. Where a new user may experience this book as a series of solutions, a more experienced user will find a basis on which you can develop your existing skills. So rest assured, there is something for everyone and regardless of your current level of experience, if you are interested in using CentOS 6, then this is the book that offers the insight you need to move forward and master your server.

CentOS 7 Linux Server Cookbook - Second Edition

by Jonathan Hobson Oliver Pelz

Over 80 recipes to get up and running with CentOS 7 Linux server About This Book * A practical guide to install, configure, administer and maintain CentOS 7 servers * An in-depth guide to the CentOS 7 operating system, exploring its various new features and changes in server administration * Presents tricks and solutions to tackle common server issues with the help of practical examples and real-life scenarios Who This Book Is For This book is targeted at beginner and more experienced system administrators alike who want to use CentOS as their server solution. Readers do not need much pre-knowledge or experience at all to work with this book. What You Will Learn * Install and configure CentOS 7 Linux server system from scratch using normal and advanced methods * Maintain a performance-based and secure server solution by deploying expert configuration advice and managing software packages * Monitor, manage and develop your server's file system to maintain a stable performance * Gain best practice methods on sharing files and resources through a network * Install and configure common standard services such as web, mail, FTP, database and domain name server technologies * Introduce you to the world of operating-system-level virtualization using the Docker platform. * Understand the fundamentals of the Security-Enhanced Linux access control architecture * Monitor your IT infrastructure using Nagios In Detail This book will provide you with a comprehensive series of starting points that will give you direct access to the inner workings of the latest CentOS version 7 and help you trim the learning curve to master your server. You will begin with the installation and basic configuration of CentOS 7, followed by learning how to manage your system, services and software packages. You will then gain an understanding of how to administer the file system, secure access to your server and configure various resource sharing services such as file, printer and DHCP servers across your network. Further on, we cover advanced topics such as FTP services, building your own DNS server, running database servers, and providing mail and web services. Finally, you will get a deep understanding of SELinux and you will learn how to work with Docker operating-system virtualization and how to monitor your IT infrastructure with Nagios. By the end of this book, you will have a fair understanding of all the aspects of configuring, implementing and administering CentOS 7 Linux server and how to put it in control. Style and approach This book is a practical reference guide with hands-on examples and solutions to real-world administration problems. It covers in-depth and comprehensive information on CentOS 7 and its new features.

CentOS High Availability

by Mitja Resman

This book is targeted at system engineers and system administrators who want to upgrade their knowledge and skills in high availability and want to learn practically how to achieve high availability with CentOS Linux. You are expected to have good CentOS Linux knowledge and basic networking experience.

CentOS High Performance

by Gabriel Canepa

Create high availability clusters to enhance system performance using CentOS 7 About This Book * Master the concepts of high performance and high availability to eliminate performance bottlenecks * Maximize the uptime of services running in a CentOS 7 cluster * A step-by-step guide that will provide knowledge of methods and approaches to optimize the performance of CentOS clusters Who This Book Is For This book is targeted at system administrators: those who want a detailed, step-by-step guide to learn how to set up a high-availability CentOS 7 cluster, and those who are looking for a reference book to help them learn or refresh the necessary skills to ensure their systems and respective resources are utilized optimally. No previous knowledge of high-availability systems is needed, though the reader is expected to have at least some degree of familiarity with any spin-off of the Fedora family of Linux distributions, preferably CentOS. What You Will Learn * Install a CentOS 7 cluster and network infrastructure * Configure firewall, networking, and clustering services and settings * Set up and test a HAC (high-availability cluster) to host an Apache web server and a MariaDB database server * Monitor performance and availability * Identify bottlenecks and troubleshoot issues * Improve performance and ensure high availability In Detail CentOS is the enterprise level Linux OS, which is 100% binary compatible to Red Hat Enterprise Linux (RHEL). It acts as a free alternative to RedHat's commercial Linux offering, with only a change in the branding. A high performance cluster consists in a group of computers that work together as one set parallel, hence minimizing or eliminating the downtime of critical services and enhancing the performance of the application. Starting with the basic principles of clustering, you will learn the necessary steps to install a cluster with two CentOS 7 servers. We will then set up and configure the basic required network infrastructure and clustering services. Further, you will learn how to take a proactive approach to the split-brain issue by configuring the failover and fencing of the cluster as a whole and the quorum of each node individually. Further, we will be setting up HAC and HPC clusters as a web server and a database server. You will also master the art of monitoring performance and availability, identifying bottlenecks, and exploring troubleshooting techniques. At the end of the book, you'll review performance-tuning techniques for the recently installed cluster, test performance using a payload simulation, and learn the necessary skills to ensure that the systems, and the corresponding resources and services, are being utilized to their best capacity. Style and approach An easy-to-follow and step-by-step guide with hands-on instructions to set up real-world simple cluster scenarios that will start you on the path to building more complex applications on your own.

CentOS System Administration Essentials

by Andrew Mallett

If you are a Linux administrator who is looking to gain knowledge that differentiates yourself from the crowd, then this is the book for you. Beginners who have a keen interest to learn more about Linux administration will also progress quickly with this resourceful learning guide.

Century 21 Computer Applications and Keyboarding (7th Edition)

by Jack P. Hoggatt Jon A. Shank Jerry W. Robinson

This 7th edition is a revision of Century 21 Keyboarding & Information Processing which reflects the changing keyboarding course. The complete course contains 150 keyboarding and word processing lessons, 54 computer apps lessons, and 15 new key learning lessons (in the Resources section).

Century 21™ Computer Applications and Keyboarding, Comprehensive, Lessons 1-150

by Jack P. Hoggatt Jon A. Shank

Provide students with the best in keyboarding education from the proven keyboarding leader--now stronger than ever! This latest edition helps to prepare students for a lifetime of keyboarding success with a complete family of proven solutions updated for a new decade of business challenges. Students tap into the latest keyboarding technology, learn to master computer applications, and increase communication skills with the proven presentation from this best-selling text. Trust the leader who has taught more than 85 million to type--now bringing 100 years of publishing experience and a century of innovations together in a complete line of keyboarding solutions for you.

Century 21® Computer Applications and Keyboarding, Comprehensive, Lessons 1-170

by Jack P. Hoggatt Jon A. Shank

Provide your students with the best in keyboarding education from the proven keyboarding leader--now stronger than ever! This latest edition of CENTURY 21 COMPUTER APPLICATIONS AND KEYBOARDING helps students prepare for a lifetime of keyboarding success with innovative solutions updated to reflect today's business challenges. Students tap into the latest keyboarding technology, learn to master computer applications using Microsoft Office 2007, and increase communication skills with relevant activities throughout this best-selling text. Trust the leader who has taught more than 85 million people to type--bringing 100 years of publishing experience and a century of innovations together in a complete line of keyboarding solutions.

Century 21® Computer Applications and Keyboarding, Comprehensive, Lessons 1-170

by Jack P. Hoggatt Jon A. Shank

Provide your students with the best in keyboarding education from the proven keyboarding leader--now stronger than ever! This latest edition of CENTURY 21 COMPUTER APPLICATIONS AND KEYBOARDING helps students prepare for a lifetime of keyboarding success with innovative solutions updated to reflect today's business challenges. Students tap into the latest keyboarding technology, learn to master computer applications using Microsoft Office 2007, and increase communication skills with relevant activities throughout this best-selling text. Trust the leader who has taught more than 85 million people to type--bringing 100 years of publishing experience and a century of innovations together in a complete line of keyboarding solutions.

Century 21™ Computer Keyboarding: Essentials, Lessons 1-75

by Jack P. Hoggatt Jon A. Shank

Century 21 Computer Keyboarding gives you what you are looking for in a one semester course on new key learning, document formatting and word processing. This text is a combination of 50 lessons of key learning/ technique mastery and 25 lessons on word processing/document formatting.

Century 21® Computer Keyboarding, Essentials, Lessons 1-80

by Jack P. Hoggatt Jon A. Shank

CENTURY 21 COMPUTER KEYBOARDING provides everything you need for in a one-semester course covering new-key learning, document formatting, and word processing. This latest edition helps students prepare for a lifetime of keyboarding success with innovative solutions updated to reflect today's business challenges. Trust the leader who has taught more than 85 million people to type--bringing 100 years of publishing experience and a century of innovations together in a complete line of keyboarding solutions. <P> Advisory: Bookshare has learned that this book offers only partial accessibility. We have kept it in the collection because it is useful for some of our members. To explore further access options with us, please contact us through the Book Quality link on the right sidebar. Benetech is actively working on projects to improve accessibility issues such as these.

Century 21® Jr.: Computer Applications with Keyboarding

by Jack P. Hoggatt Jon A. Shank James R. Smith

Just getting started in the computer world? This introductory text, CENTURY 21(tm), JR. COMPUTER APPLICATIONS WITH KEYBOARDING, 3E is the perfect companion for navigation of computer basics, file management, the Internet, keyboarding, word processing, desktop publishing, spreadsheets, presentations, and databases. CENTURY 21, JR. provides step-by-step guidance, with engaging activities. Units are divided into easy-to-manage chapters and projects will help students learn the features of Microsoft Office 2013 and 365.

Century 21® Jr., Input Technologies & Computer Applications

by Jack P. Hoggatt Jon A. Shank Karl Barksdale

Looking for a solution to get your students started in the computer world? This introductory text, CENTURY 21, JR. INPUT TECHNOLOGIES AND COMPUTER APPLICATIONS, 2e is the perfect companion for navigation of computer basics, file management, the Internet, keyboarding, handwriting recognition, speech recognition, tablet PCs, word processing, desktop publishing, spreadsheets, presentations, databases, HTML programming, and Web pages. CENTURY 21, JR. provides step-by-step guidance, with engaging activities labeled as Learn, Practice, and Apply. Units are divided into easy-to-manage chapters and projects will help students learn the features of Microsoft Office 2007.

Ceph Cookbook

by Karan Singh

Over 100 effective recipes to help you design, implement, and manage the software-defined and massively scalable Ceph storage system About This Book * Implement a Ceph cluster successfully and gain deep insights into its best practices * Harness the abilities of experienced storage administrators and architects, and run your own software-defined storage system * This comprehensive, step-by-step guide will show you how to build and manage Ceph storage in production environment Who This Book Is For This book is aimed at storage and cloud system engineers, system administrators, and technical architects who are interested in building software-defined storage solutions to power their cloud and virtual infrastructure. If you have basic knowledge of GNU/Linux and storage systems, with no experience of software defined storage solutions and Ceph, but eager to learn this book is for you. What You Will Learn * Understand, install, configure, and manage the Ceph storage system * Get to grips with performance tuning and benchmarking, and gain practical tips to run Ceph in production * Integrate Ceph with OpenStack Cinder, Glance, and nova components * Deep dive into Ceph object storage, including s3, swift, and keystone integration * Build a Dropbox-like file sync and share service and Ceph federated gateway setup * Gain hands-on experience with Calamari and VSM for cluster monitoring * Familiarize yourself with Ceph operations such as maintenance, monitoring, and troubleshooting * Understand advanced topics including erasure coding, CRUSH map, cache pool, and system maintenance In Detail Ceph is a unified, distributed storage system designed for excellent performance, reliability, and scalability. This cutting-edge technology has been transforming the storage industry, and is evolving rapidly as a leader in software-defined storage space, extending full support to cloud platforms such as Openstack and Cloudstack, including virtualization platforms. It is the most popular storage backend for Openstack, public, and private clouds, so is the first choice for a storage solution. Ceph is backed by RedHat and is developed by a thriving open source community of individual developers as well as several companies across the globe. This book takes you from a basic knowledge of Ceph to an expert understanding of the most advanced features, walking you through building up a production-grade Ceph storage cluster and helping you develop all the skills you need to plan, deploy, and effectively manage your Ceph cluster. Beginning with the basics, you'll create a Ceph cluster, followed by block, object, and file storage provisioning. Next, you'll get a step-by-step tutorial on integrating it with OpenStack and building a Dropbox-like object storage solution. We'll also take a look at federated architecture and CephFS, and you'll dive into Calamari and VSM for monitoring the Ceph environment. You'll develop expert knowledge on troubleshooting and benchmarking your Ceph storage cluster. Finally, you'll get to grips with the best practices to operate Ceph in a production environment. Style and approach This step-by-step guide is filled with practical tutorials, making complex scenarios easy to understand.

CFEngine 3 Beginner’s Guide

by Rajneesh

Part of Packt's Beginner's Guide series, this book guides you through setting up Cfengine to maximizing its potential. This book focuses on getting you through all the major learning points in a smooth, logical order. You'll also learn how to avoid some common pitfalls. If you are a System Administrator or Configuration manager with a growing infrastructure and if you are looking for a dependable tool to manage your infrastructure, then this book is for you. If your infrastructure is already big with hundreds and thousands of nodes and you are looking for a secure, versatile and stable configuration management tool, you will still find this book handy. You don't need any prior experience of Cfengine to follow this book.

CGI Manual of Style

by Robert Mcdaniel

Anyone can put a site up on the Web-but what makes people come back again and again? This indispensable reference is your guide to CGI (Common Gateway Interface), the key to tailoring your site to suit your visitors' needs by controlling and analyzing the flow of information on your site. No experience with C or Perl is assumed. Real-world examples are presented in easy-to follow tutorials.

Showing 1,576 through 1,600 of 12,051 results

Help

Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the Help Center.

Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.

  • Bookshare Web Reader - a customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
  • DAISY (Digital Accessible Information System) - a digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ‘DAISY Text with Images’.
  • BRF (Braille Refreshable Format) - digital Braille for use with refreshable Braille devices and Braille embossers.
  • MP3 (Mpeg audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
  • DAISY Audio - Similar to the Daisy 3.0 option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivonas Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.