Operating Systems

Windows 10 Revealed

Windows 10 Revealed is your essential step-by-step guide to using a desktop, laptop, Surface or Windows Phone running Microsoft Windows 10, providing a complete resource for both the beginner and the enthusiast. Techniques are illustrated step-by-step using photography and screen shots throughout, together with concise, easy to follow text from an established expert in the field, providing a comprehensive guide to Windows. Whether you have just bought your first computer, laptop or are a keen computer user who has just upgraded to Windows 10, this book will provide you with a firm grasp of the underpinning foundations and equip you with the skills needed to use a computer like a pro.

Windows Software Compatibility and Hardware Troubleshooting

As companies keep their existing hardware and operating systems for more years than ever before, the need to diagnose and repair problems is becoming ever more important for IT Pros and system administrators. Whatever version of Windows you're using (including Windows 10) you'll likely need to maintain compatibility with older software that the company must use for mission-critical operations, or older hardware that's required for specific purposes, but you don't want to sacrifice security for the sake of compatibility. In this briefbook you'll learn how to maintain optimal compatibility with the older software and devices that you need to use.

Pro Linux High Availability Clustering

Pro Linux High Availability Clustering teaches you how to implement this fundamental Linux add-on into your business. Linux High Availability Clustering is needed to ensure the availability of mission critical resources. The technique is applied more and more in corporate datacenters around the world. While lots of documentation about the subject is available on the internet, it isn't always easy to build a real solution based on that scattered information, which is often oriented towards specific tasks only. Pro Linux High Availability Clustering explains essential high-availability clustering components on all Linux platforms, giving you the insight to build solutions for any specific case needed.

Beginning Fedora Desktop

Beginning Fedora Desktop: Fedora 20 Edition is a complete guide to using the Fedora 20 Desktop Linux release as your daily driver for multimedia, productivity, social networking, the GNOME 3 desktop, administrative tasks, and more. Author and Linux expert Richard Petersen delves into the operating system as a whole and offers you a complete treatment of Fedora 20 Desktop configuration and use.

Windows 8.1: Out of the Box, 2nd Edition

Get a real feel for Windows 8.1 with a wealth of tips in this step-by-step guide. After using Windows 7 or XP, learning Microsoft's latest operating system takes some adjustment. Never fear. Windows expert Mike Halsey starts with the basics and then takes you through the trickier parts of Microsoft's latest operating system. You'll quickly learn how to make the most of Windows 8 for work and entertainment, whether you use a touchscreen tablet, a laptop, or a PC with a keyboard and mouse.

Linux Mint Essentials

Linux Mint is one of the most popular and proven distributions for beginners and advanced users alike. Out of the box hardware and multimedia support makes Mint your go-to choice for general computing. Its ease of use has transformed it into a celebrated Linux distribution.This is an all-inclusive guide to Linux Mint, and will teach you everything you need to know in order to use a Linux Mint system. The book starts with the installation process and covers task-oriented topics such as browsing the Internet and installing software as well as shell commands. This guide walks the reader through installing and maintaining Linux Mint on a personal computer.

Learning Microsoft Windows Server 2012 Dynamic Access Control

Identifying and classifying information inside a company is one of the most important prerequisites for securing the sensitive information of various business units. Windows Server 2012 Dynamic Access Control helps you not only to classify information, but it also gives you the opportunity and the functionality to provide a safe-net policy across your file servers, showing you some helpful ways of auditing and access denied assistance to improve usability.

OS X Mavericks: The Missing Manual

What do you get when you cross a Mac with an iPad? OS X 10.9 Mavericks. Its 200 new features include Mac versions of iPad goodies like Maps, iBooks, and iTunes Radio—but not a single page of instructions. Fortunately, David Pogue is back, with the expertise and humor that have made this the #1 bestselling Mac book for over 11 years straight.

Windows 8.1: The Missing Manual

Windows 8.1 continues the evolution of the most radical redesign in Microsoft's history. It combines the familiar Windows desktop with a new, touchscreen-friendly world of tiles and full-screen apps. Luckily, David Pogue is back to help you make sense of it—with humor, authority, and 500 illustrations.

Building Windows 8.1 Apps from the Ground Up

This book is the perfect introduction for anyone wanting to create sophisticated Windows 8 apps for the first time.Assuming only a basic knowledge of HTML and CSS we'll walk you through the development process using C# and VB. The book will familiarize you with the tools you'll need to use in order to make the most of Windows' stunning new features. You'll discover how to take advantage of the built-in functionality to create high quality user experiences.

Instant Ubuntu

Ubuntu is widely considered the worlds' most popular Linux distribution. Focusing on simplicity and ease of use, it provides an intuitive desktop environment suitable even for the novice user. Built by a worldwide team of developers, Ubuntu provides a welcoming approach to software.

The Art of Memory Forensics

Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics - now the most sought after skill in the digital forensics and incident response fields.

 

1 2 3 4 5 Last