Author: Guy Hart-Davis
Publisher: McGraw Hill Professional
ISBN: 0072264705
Category : Computers
Languages : en
Pages : 304
Book Description
Provides easy-to-follow instructions on how to perform twenty-four cool things with an iPod, including use it as a voice recorder, read email, install a different operating system, enhance audio quality, and more.
CNET Do-It-Yourself IPod Projects
Author: Guy Hart-Davis
Publisher: McGraw Hill Professional
ISBN: 0072264705
Category : Computers
Languages : en
Pages : 304
Book Description
Provides easy-to-follow instructions on how to perform twenty-four cool things with an iPod, including use it as a voice recorder, read email, install a different operating system, enhance audio quality, and more.
Publisher: McGraw Hill Professional
ISBN: 0072264705
Category : Computers
Languages : en
Pages : 304
Book Description
Provides easy-to-follow instructions on how to perform twenty-four cool things with an iPod, including use it as a voice recorder, read email, install a different operating system, enhance audio quality, and more.
CNET Do-It-Yourself Windows Vista Projects : 24 Cool Things You Didn't Know You Could Do!
Author: Curt Simmons
Publisher: Mcgraw-hill
ISBN: 9780071485616
Category : Computers
Languages : en
Pages : 208
Book Description
Take Windows Vista to new horizons Now you can get the most out of Microsoft's revolutionary new operating system with the practical and entertaining projects packed inside this easy-to-follow guide. Produced in conjunction with CNET.com, the place you go for the latest in tech and consumer electronics, this book shows you how to do all kinds of cool things with Windows Vista, like create CDs and DVDs, set up a virtual meeting room, improve your PC's performance, solve home networking problems, recover lost files, and more. Inside, you'll find 24 self-contained projects, step-by-step instructions, a list of tools needed at the beginning of each project, and hundreds of clear photos and screenshots. With CNET Do-It-Yourself Windows Vista Projects, you'll reach new levels of fun and productivity. Create a custom Windows Sidebar Watch TV on your PC and record your favorite shows Enable speech recognition Create your own movie and burn it to a DVD Synchronize your PC with other computers and devices Schedule automatic backups for your data Turn your PC into a GPS device And much more
Publisher: Mcgraw-hill
ISBN: 9780071485616
Category : Computers
Languages : en
Pages : 208
Book Description
Take Windows Vista to new horizons Now you can get the most out of Microsoft's revolutionary new operating system with the practical and entertaining projects packed inside this easy-to-follow guide. Produced in conjunction with CNET.com, the place you go for the latest in tech and consumer electronics, this book shows you how to do all kinds of cool things with Windows Vista, like create CDs and DVDs, set up a virtual meeting room, improve your PC's performance, solve home networking problems, recover lost files, and more. Inside, you'll find 24 self-contained projects, step-by-step instructions, a list of tools needed at the beginning of each project, and hundreds of clear photos and screenshots. With CNET Do-It-Yourself Windows Vista Projects, you'll reach new levels of fun and productivity. Create a custom Windows Sidebar Watch TV on your PC and record your favorite shows Enable speech recognition Create your own movie and burn it to a DVD Synchronize your PC with other computers and devices Schedule automatic backups for your data Turn your PC into a GPS device And much more
Library Journal
Author:
Publisher:
ISBN:
Category : Libraries
Languages : en
Pages : 948
Book Description
Includes, beginning Sept. 15, 1954 (and on the 15th of each month, Sept.-May) a special section: School library journal, ISSN 0000-0035, (called Junior libraries, 1954-May 1961). Also issued separately.
Publisher:
ISBN:
Category : Libraries
Languages : en
Pages : 948
Book Description
Includes, beginning Sept. 15, 1954 (and on the 15th of each month, Sept.-May) a special section: School library journal, ISSN 0000-0035, (called Junior libraries, 1954-May 1961). Also issued separately.
The Writers Directory
Author:
Publisher:
ISBN:
Category : Authors, American
Languages : en
Pages : 680
Book Description
Publisher:
ISBN:
Category : Authors, American
Languages : en
Pages : 680
Book Description
American Book Publishing Record
Author:
Publisher:
ISBN:
Category : American literature
Languages : en
Pages : 838
Book Description
Publisher:
ISBN:
Category : American literature
Languages : en
Pages : 838
Book Description
The British National Bibliography
Author: Arthur James Wells
Publisher:
ISBN:
Category : Bibliography, National
Languages : en
Pages : 870
Book Description
Publisher:
ISBN:
Category : Bibliography, National
Languages : en
Pages : 870
Book Description
Working Effectively with Legacy Code
Author: Michael Feathers
Publisher: Prentice Hall Professional
ISBN: 0132931753
Category : Computers
Languages : en
Pages : 457
Book Description
Get more out of your legacy systems: more performance, functionality, reliability, and manageability Is your code easy to change? Can you get nearly instantaneous feedback when you do change it? Do you understand it? If the answer to any of these questions is no, you have legacy code, and it is draining time and money away from your development efforts. In this book, Michael Feathers offers start-to-finish strategies for working more effectively with large, untested legacy code bases. This book draws on material Michael created for his renowned Object Mentor seminars: techniques Michael has used in mentoring to help hundreds of developers, technical managers, and testers bring their legacy systems under control. The topics covered include Understanding the mechanics of software change: adding features, fixing bugs, improving design, optimizing performance Getting legacy code into a test harness Writing tests that protect you against introducing new problems Techniques that can be used with any language or platform—with examples in Java, C++, C, and C# Accurately identifying where code changes need to be made Coping with legacy systems that aren't object-oriented Handling applications that don't seem to have any structure This book also includes a catalog of twenty-four dependency-breaking techniques that help you work with program elements in isolation and make safer changes.
Publisher: Prentice Hall Professional
ISBN: 0132931753
Category : Computers
Languages : en
Pages : 457
Book Description
Get more out of your legacy systems: more performance, functionality, reliability, and manageability Is your code easy to change? Can you get nearly instantaneous feedback when you do change it? Do you understand it? If the answer to any of these questions is no, you have legacy code, and it is draining time and money away from your development efforts. In this book, Michael Feathers offers start-to-finish strategies for working more effectively with large, untested legacy code bases. This book draws on material Michael created for his renowned Object Mentor seminars: techniques Michael has used in mentoring to help hundreds of developers, technical managers, and testers bring their legacy systems under control. The topics covered include Understanding the mechanics of software change: adding features, fixing bugs, improving design, optimizing performance Getting legacy code into a test harness Writing tests that protect you against introducing new problems Techniques that can be used with any language or platform—with examples in Java, C++, C, and C# Accurately identifying where code changes need to be made Coping with legacy systems that aren't object-oriented Handling applications that don't seem to have any structure This book also includes a catalog of twenty-four dependency-breaking techniques that help you work with program elements in isolation and make safer changes.
The Security Development Lifecycle
Author: Michael Howard
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 364
Book Description
Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs--the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team guide you through each stage of the SDL--from education and design to testing and post-release. You get their first-hand insights, best practices, a practical history of the SDL, and lessons to help you implement the SDL in any development organization. Discover how to: Use a streamlined risk-analysis process to find security design issues before code is committed Apply secure-coding best practices and a proven testing process Conduct a final security review before a product ships Arm customers with prescriptive guidance to configure and deploy your product more securely Establish a plan to respond to new security vulnerabilities Integrate security discipline into agile methods and processes, such as Extreme Programming and Scrum Includes a CD featuring: A six-part security class video conducted by the authors and other Microsoft security experts Sample SDL documents and fuzz testing tool PLUS--Get book updates on the Web. For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 364
Book Description
Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs--the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team guide you through each stage of the SDL--from education and design to testing and post-release. You get their first-hand insights, best practices, a practical history of the SDL, and lessons to help you implement the SDL in any development organization. Discover how to: Use a streamlined risk-analysis process to find security design issues before code is committed Apply secure-coding best practices and a proven testing process Conduct a final security review before a product ships Arm customers with prescriptive guidance to configure and deploy your product more securely Establish a plan to respond to new security vulnerabilities Integrate security discipline into agile methods and processes, such as Extreme Programming and Scrum Includes a CD featuring: A six-part security class video conducted by the authors and other Microsoft security experts Sample SDL documents and fuzz testing tool PLUS--Get book updates on the Web. For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.
Tcl/Tk in a Nutshell
Author: Paul Raines
Publisher: "O'Reilly Media, Inc."
ISBN: 0596555792
Category : Computers
Languages : en
Pages : 458
Book Description
The Tcl language and Tk graphical toolkit are simple and powerful building blocks for custom applications. The Tcl/Tk combination is increasingly popular because it lets you produce sophisticated graphical interfaces with a few easy commands, develop and change scripts quickly, and conveniently tie together existing utilities or programming libraries.One of the attractive features of Tcl/Tk is the wide variety of commands, many offering a wealth of options. Most of the things you'd like to do have been anticipated by the language's creator, John Ousterhout, or one of the developers of Tcl/Tk's many powerful extensions. Thus, you'll find that a command or option probably exists to provide just what you need.And that's why it's valuable to have a quick reference that briefly describes every command and option in the core Tcl/Tk distribution as well as the most popular extensions. Keep this book on your desk as you write scripts, and you'll be able to find almost instantly the particular option you need.Most chapters consist of alphabetical listings. Since Tk and mega-widget packages break down commands by widget, the chapters on these topics are organized by widget along with a section of core commands where appropriate. Contents include: Core Tcl and Tk commands and Tk widgets C interface (prototypes) Expect [incr Tcl] and [incr Tk] Tix TclX BLT Oratcl, SybTcl, and Tclodbc
Publisher: "O'Reilly Media, Inc."
ISBN: 0596555792
Category : Computers
Languages : en
Pages : 458
Book Description
The Tcl language and Tk graphical toolkit are simple and powerful building blocks for custom applications. The Tcl/Tk combination is increasingly popular because it lets you produce sophisticated graphical interfaces with a few easy commands, develop and change scripts quickly, and conveniently tie together existing utilities or programming libraries.One of the attractive features of Tcl/Tk is the wide variety of commands, many offering a wealth of options. Most of the things you'd like to do have been anticipated by the language's creator, John Ousterhout, or one of the developers of Tcl/Tk's many powerful extensions. Thus, you'll find that a command or option probably exists to provide just what you need.And that's why it's valuable to have a quick reference that briefly describes every command and option in the core Tcl/Tk distribution as well as the most popular extensions. Keep this book on your desk as you write scripts, and you'll be able to find almost instantly the particular option you need.Most chapters consist of alphabetical listings. Since Tk and mega-widget packages break down commands by widget, the chapters on these topics are organized by widget along with a section of core commands where appropriate. Contents include: Core Tcl and Tk commands and Tk widgets C interface (prototypes) Expect [incr Tcl] and [incr Tk] Tix TclX BLT Oratcl, SybTcl, and Tclodbc
The Googlization of Everything
Author: Siva Vaidhyanathan
Publisher: Univ of California Press
ISBN: 0520952456
Category : Social Science
Languages : en
Pages : 281
Book Description
In the beginning, the World Wide Web was exciting and open to the point of anarchy, a vast and intimidating repository of unindexed confusion. Into this creative chaos came Google with its dazzling mission—"To organize the world’s information and make it universally accessible"—and its much-quoted motto, "Don’t be evil." In this provocative book, Siva Vaidhyanathan examines the ways we have used and embraced Google—and the growing resistance to its expansion across the globe. He exposes the dark side of our Google fantasies, raising red flags about issues of intellectual property and the much-touted Google Book Search. He assesses Google’s global impact, particularly in China, and explains the insidious effect of Googlization on the way we think. Finally, Vaidhyanathan proposes the construction of an Internet ecosystem designed to benefit the whole world and keep one brilliant and powerful company from falling into the "evil" it pledged to avoid.
Publisher: Univ of California Press
ISBN: 0520952456
Category : Social Science
Languages : en
Pages : 281
Book Description
In the beginning, the World Wide Web was exciting and open to the point of anarchy, a vast and intimidating repository of unindexed confusion. Into this creative chaos came Google with its dazzling mission—"To organize the world’s information and make it universally accessible"—and its much-quoted motto, "Don’t be evil." In this provocative book, Siva Vaidhyanathan examines the ways we have used and embraced Google—and the growing resistance to its expansion across the globe. He exposes the dark side of our Google fantasies, raising red flags about issues of intellectual property and the much-touted Google Book Search. He assesses Google’s global impact, particularly in China, and explains the insidious effect of Googlization on the way we think. Finally, Vaidhyanathan proposes the construction of an Internet ecosystem designed to benefit the whole world and keep one brilliant and powerful company from falling into the "evil" it pledged to avoid.