Wednesday, December 28, 2011

iPhone: The Missing Manual: Covers the iPhone 3G

iPhone: The Missing Manual: Covers the iPhone 3G Review



The new iPhone 3G is here, and New York Times tech columnist David Pogue is on top of it with a thoroughly updated edition of iPhone: The Missing Manual. With its faster downloads, touch-screen iPod, and best-ever mobile Web browser, the new affordable iPhone is packed with possibilities. But without an objective guide like this one, you'll never unlock all it can do for you.

In this new edition, there are new chapters on the App Store, with special troubleshooting and sycning issues with iTunes; Apple's new MobileMe service, and what it means to the iPhone; and Microsoft Exchange ActiveSync compatibility.

Each custom designed page in iPhone: The Missing Manual helps you accomplish specific tasks with complete step-by-step instructions for everything from scheduling to web browsing to watching videos. You'll learn how to:

  • Use the iPhone as a phone -- get a guided tour of 3G's phone features and learn how much time you can save with things like Visual Voicemail, contact searching, and more
  • Figure out what 3G means and how it affects battery life, internet speed, and even phone call audio quality.
  • Treat the iPhone as an iPod -- listen to music, upload and view photos, and fill the iPhone with TV shows and movies
  • Take the iPhone online -- learn how to get online, use email, browse the Web, and use the GPS
  • Go beyond the iPhone -- discover how to use iPhone with iTunes, sync it with your calendar, and learn about The App Store where you can pick from hundreds of iPhone-friendly programs

Teeming with high-quality color graphics and filled with humor, tips, tricks, and surprises, iPhone: The Missing Manual quickly teaches you how to set up, accessorize, and troubleshoot your iPhone. Instead of fumbling around, take advantage of this device with the manual that should have been in the box. It's your call.


Thursday, December 22, 2011

Bluetooth Demystified

Bluetooth Demystified Review



Bluetooth is a wireless networking standard that allows seamless communication of voice, email and such like. This guide to Bluetooth helps to figure out if it's right for your products and services. It details the strengths and weaknesses of Bluetooth and has coverage of applications and products.


Monday, December 19, 2011

Motorola Droid X Survival Guide - Step-by-Step User Guide for Droid X: Getting Started, Downloading FREE eBooks, Using eMail, Photos and Videos, and Surfing Web (Mobi Manuals)

Motorola Droid X Survival Guide - Step-by-Step User Guide for Droid X: Getting Started, Downloading FREE eBooks, Using eMail, Photos and Videos, and Surfing Web (Mobi Manuals) Review



This concise Motorola Droid X manual provides step-by-step instructions on how to do everything with your Droid X FASTER. This phone is a highly customizable device that uses the Android operating system. You will unlock hidden secrets on your device, such as how to download FREE eBooks, send email, surf the web, and read news for FREE.

This Droid X guide includes:

Getting Started:

- Button Layout
- Navigating the Screens
- Making Calls
- Using the Speakerphone During a Voice Call
- Staring a Conference Call
- Managing Your Contacts
- Adding a New Contact
- Adding a Favorite Contact (Speed Dial)
- Text Messaging
- Adding Texted Phone Numbers to Contacts
- Copying, Cutting, and Pasting Text
- Using Swype
- Sending Picture and Video Messages
- Using the Internet Browser
- Managing Open Browser Windows
- Photos and Videos
- Taking Pictures
- Capturing Videos
- Using the Email Application
- Changing Email Options
- Managing Applications
- Sharing an Application
- Using the Android Market to Download Applications
- Reading User Reviews
- Deleting an Application

Advanced Topics:

- Reading eBooks on the Droid X
- Downloading thousands of free eBooks
- Adjusting the Settings
- Turning Vibration On and Off
- Setting Alert Sounds
- Changing the Wallpaper
- Setting a Pattern Lock
- Changing Keyboard Settings
- Changing Photo Settings
- Turning Bluetooth On and Off
- Turning Wi-Fi On and Off
- Turning Airplane Mode On and Off
- Tips and Tricks
- Using Voice Search
- Maximizing Battery Life
- Resetting Your Droid X
- Viewing the Full Horizontal Keyboard
- Calling a Number on a Website
- Troubleshooting
- List of Droid-friendly websites that save you time typing in long URL addresses


Friday, December 16, 2011

The Second-Hand Parrot

The Second-Hand Parrot Review



The Second-Hand Parrot Feature

  • Paperback / 96 Pages / 6 1/2 x 7 7/8 / 2002
Two expert parrot owners point out the pros and cons of adopting a bird that has had a previous owner. All Complete Pet Owner's Manuals are heavily illustrated with color photos and line art, and are filled with reliable, easy-to-understand information on pet care. The many titles in this series show and tell pet owners how to care for dogs, cats, birds, fish, reptiles, gerbils, hamsters, and virtually every other animal that is kept as a pet. The books give advice on purchasing and otherwise acquiring a pet, maintaining health care, housing, proper feeding, and where applicable, grooming and training. Clear, straightforward text comes with high-quality, full-color photos and anatomically accurate line art, as well as helpful tables and charts.


Thursday, December 15, 2011

Android Wireless Application Development (2nd Edition) (Developer's Library)

Android Wireless Application Development (2nd Edition) (Developer's Library) Review



The start-to-finish guide to Android application development: massively updated for the newest SDKs and developer techniques!

 

This book delivers all the up-to-date information, tested code, and best practices you need to create and market successful mobile apps with the latest versions of Android. Drawing on their extensive experience with mobile and wireless development, Lauren Darcey and Shane Conder cover every step: concept, design, coding, testing, packaging, and delivery. The authors introduce the Android platform, explain the principles of effective Android application design, and present today’s best practices for crafting effective user interfaces. Next, they offer detailed coverage of each key Android API, including data storage, networking, telephony, location-based services, multimedia, 3D graphics, and hardware.

 

Every chapter of this edition has been updated for the newest Android SDKs, tools, utilities, and hardware. All sample code has been overhauled and tested on leading devices from multiple companies, including HTC, Motorola, and ARCHOS. Many new examples have been added, including complete new applications. This new edition also adds

 

  • Nine new chapters covering web APIs, the Android NDK, extending application reach, managing users, data synchronization, backups, advanced user input, and more
  • Greatly expanded coverage of Android manifest files, content providers, app design, and testing
  • New coverage of hot topics like Bluetooth, gestures, voice recognition, App Widgets, live folders, live wallpapers, and global search
  • Updated 3D graphics programming coverage reflecting OpenGL ES 2.0
  • An all-new chapter on tackling cross-device compatibility issues, from designing for the smallest phones to the big new tablets hitting the market
  • Even more tips and tricks to help you design, develop, and test applications for different devices
  • A new appendix full of Eclipse tips and tricks

 

This book is an indispensable resource for every member of the Android development team: software developers with all levels of mobile experience, team leaders and project managers, testers and QA specialists, software architects, and even marketers.


Thursday, December 8, 2011

More iOS 5 Development: Further Explorations of the iOS SDK

More iOS 5 Development: Further Explorations of the iOS SDK Review



Interested in iPhone and iPad apps development? Want to learn more? Whether you’re a self-taught iPhone and iPad apps development genius or have just made your way through the pages of Beginning iOS 5 Development, we have the perfect book for you.

More iOS 5 Development: Further Explorations of the iOS SDK digs deeper into Apple’s latest iOS 5 SDK. Bestselling authors Dave Mark, Alex Horovitz, Kevin Kim and Jeff LaMarche explain concepts as only they can—covering topics like Core Data, peer-to-peer networking using GameKit and network streams, working with data from the web, MapKit, in-application e-mail, and more. All the concepts and APIs are clearly presented with code snippets you can customize and use, as you like, in your own apps.

If you are going to write a professional iPhone or iPad app, you’ll want to get your arms around Core Data, and there’s no better place to do so than in the pages of this book. The book continues right where Beginning iOS 5 Development leaves off, with a series of chapters devoted to Core Data, the standard for persistence that Apple introduced to iPhone with SDK 3. Dave, Alex, Kevin and Jeff carefully step through each Core Data concept and show techniques and tips specifically for writing larger apps—offering a breadth of coverage you won't find anywhere else.

The Core Data coverage alone is worth the price of admission. But there's so much more! More iOS 5 Development covers a variety of networking mechanisms, from GameKit’s relatively simple BlueTooth peer-to-peer model, to the addition of Bonjour discovery and network streams, through the complexity of accessing files via the web.

Dave, Scott and Jeff will also take you through coverage of concurrent programming and some advanced techniques for debugging your applications. The enhanced multitasking, threading, memory management and more are important, although iPhone 4S is dual core.  Apps are getting more and more complex, including sophisticated game apps that offer virtual or augmented reality experiences that take advantage of sensors and other APIs in the newest iOS 5 SDK.

Whether you are a relative newcomer to iPhone and iPad or iOS development or an old hand looking to expand your horizons, there’s something for everyone in More iOS 5 Development.

Note: A few of the apps in this book demonstrate technologies not yet supported by the simulator. To run them on your iPhone or iPod touch, you'll need to join one of Apple's paid iPhone developer programs.

What you’ll learn

  • All about Core Data: key concepts and techniques for writing larger applications
  • How to utilize a variety of networking mechanisms, including peer-to-peer connections over Bluetooth using GameKit
  • Details on the addition of Bonjour discovery and network streams
  • How to embed maps with Map Kit and use in-application email
  • How to access a user’s iPod library and integrate music into apps
  • Essentials of concurrent programming and advanced debugging techniques
  • How to work with enhanced multitasking, threading, memory management and other APIs
  • Tips on working with data from the web and the cloud, including Apple's  iCloud 
  • How to work with the iOS 5 SDK when dealing with sensors, gyroscopes, etc. for augmented reality experiences in game and socia media apps

Who this book is for

All iPhone, iPod touch, and iPad app developers, especially developers already familiar with the basics of Apple's iPhone SDKs.


Sunday, November 27, 2011

A+, Network+, Security+ Exams in a Nutshell: A Desktop Quick Reference (In a Nutshell (O'Reilly))

A+, Network+, Security+ Exams in a Nutshell: A Desktop Quick Reference (In a Nutshell (O'Reilly)) Review



If you're preparing for the new CompTIA 2006 certification in A+, or the current Network+ and Security+ certifications, you'll find this book invaluable. It provides all the information you need to get ready for these exams, including the four new A+ exams -- the required Essentials exam and three elective exams that pertain to your area of specialization.

As with other O'Reilly Nutshell books for certification exams, A+, Network+ and Security + in a Nutshell follows a proven style and approach. It reviews all of the topics needed to master each exam in a remarkably concise format, with required knowledge boiled down to the core. Instead of plowing through 500 to 700 pages to prepare for each exam, this book covers each one in approximately 150 pages. And because the objectives for the three elective A+ exams are redundant, and the book covers them in one section.

The exams covered include:

  • A+ Essentials: Required for A+ 2006 certification
  • EXAM 220-602: For the A+ IT Technician specialization
  • EXAM 220-603: For the A+ Remote Support Technician specialization
  • EXAM 220-604: For the A+ IT Depot specialization
  • EXAM N10-003: For Network+ Certification
  • EXAM SYO-101: For Security+ Certification


Each exam is covered in three parts: Exam Overview, Study Guide and Prep and Practice. Plenty of detailed tables and screen shots are included, along with study notes and practice questions. Once you have completed the exams successfully, you will find this all-in-one book to be a valuable reference to core administration and security skills.


Wednesday, November 23, 2011

Skype Hacks: Tips & Tools for Cheap, Fun, Innovative Phone Service

Skype Hacks: Tips & Tools for Cheap, Fun, Innovative Phone Service Review



If you've heard about Skype--and who hasn't with all the recent media attention devoted to internet telephone services--chances are you've been mighty tempted to try it out. Skype Hacks tells you what all the Skype hype is about, explains the basics, and shows you more than 100 clever tips and tricks for tweaking and tuning Skype to make it do just what you want and more.

Millions of people (48 million and counting, in fact) have opted for Skype, which uses peer-to-peer (P2P) technology to turn any PC, Mac, or Pocket PC into a telephone. Skype offers free calls between computers and extremely cheap calls to "old-fashioned" phone numbers (landlines and mobile phones). The sound quality is excellent, and end-to-end encryption means the connection is private and secure.

But if you really know what you're doing, Skype can accomplish a whole lot more than that. Software developer and author Andrew Sheppard recently converted his entire house to Skype and uses it for all his personal and business calls, even when he's traveling. In Skype Hacks, he shows you how to do things with the technology that even the engineers at Skype probably never intended.

Skype Hacks shows you how to:

  • Get started with Skype
  • Figure out how much money you're saving and maximize your savings
  • Cut the ties to your old phone company
  • Optimize your Skype configuration
  • Integrate Skype with desktop tools like Microsoft Office and your web browser
  • Set up a Skype-based call center

The book offers ideas for creating and organizing a contacts list, using Skype to transfer files, taking advantage of chat and voicemail capabilities, turning a PDA into a mobile phone, and automating Skype for even greater efficiency. So whether you'd simply like to give Skype a trial run, you want new Skype ring tones and fun on-hold music, or you're considering wiring your home with Skype to get rid of "regular" phone service altogether, Skype Hacks is your ideal guide.


Sunday, November 20, 2011

Wireless - Webster's Specialty Crossword Puzzles

Wireless - Webster's Specialty Crossword Puzzles Review



If you enjoy crosswords, or need to learn more about the word "wireless", these crosswords are for you. Learning a subject can be difficult. To ease the pain, hints are provided at the bottom of each page, though these are selected to prevent an engineered solution to the puzzle. The clues in this book are used under license or with permission, used under "fair use" conditions, used in agreement with the original authors, or are in the public domain. Definitions of terms can be found at www.websters-online-dictionary.org. All entries marked [WP] are adapted from articles created by contributors to Wikipedia.org, the free encyclopedia under a copyleft GNU Free Documentation License (GFDL) based on the headword. Please note that these entries are not full articles. For the full article associated with a given Wikipedia headword, the reader can simply go to www.wikipedia.org or www.websters-online-dictionary.org and type in the name of the topic to better understand the context of the entry; passages attributed to Wikipedia are exempt from any compilation or other copyright held by this book and can be freely used under the GFDL found at www.wikipedia.org. The full GFDL is reproduced at the end of the book after the solutions, and applies to each Wikipedia headword. Enjoy!


Tuesday, November 15, 2011

Official (ISC)2® Guide to the ISSAP® CBK ((ISC)2 Press)

Official (ISC)2® Guide to the ISSAP® CBK ((ISC)2 Press) Review



Candidates for the CISSP-ISSAP® professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP® CBK®, but also the ability to apply this in-depth knowledge to develop a detailed security architecture that meets all requirements.

Supplying an authoritative review of the key concepts and requirements of the ISSAP® CBK®, the Official (ISC) Guide to the ISSAP® CBK® provides the practical understanding required to implement the latest security protocols to improve productivity, profitability, security, and efficiency. Encompassing all of the knowledge elements needed to create secure architectures, the text covers the six domains: Requirements Analysis, Access Control, Cryptography, Physical Security, BCP/DRP, and Telecommunications and Network Security.

  • Endorsed by the (ISC)
  • Follows the newly revised CISSP-ISSAP® CBK®
  • Reflects the evolving terminology and changing requirements for security professionals

With chapters written by those shaping this relatively new and rapidly developing field, this book is the only officially endorsed guide to the CISSP-ISSAP® CBK®. Read it, study it, and refer to it often as it will help improve your chances of achieving certification the first time around. Following certification it will serve as an authoritative reference for constructing architectures that are compliant with the latest security requirements.


Thursday, November 10, 2011

Security Issues in Wireless Technologies:: Bluetooth, MANET and WiMAX

Security Issues in Wireless Technologies:: Bluetooth, MANET and WiMAX Review



Due to the flexibility and mobility of wireless technologies; Bluetooth, Zig-bee, RFID, WiMAX etc. have become most commonly used medium of wireless communication. Although the demand of these technologies is rapidly increasing all over the world, very few of us are aware about the security issues related to them. A number of attacks is possible to make illegal access to our system if we do not know how to protect our system from intruders. This book focuses on security threats and countermeasures of Bluetooth, MANET and WiMAX. The readers will get to know about different types of attacks as well as preventive mechanisms. Some research questions are also identified that may be interesting to those who want to go for further study.


Monday, November 7, 2011

Complete Guide to Networking

Complete Guide to Networking Review



Peter Norton's Complete Guide to Networking discusses a variety of topics that are critical to successfully understanding and using a network system, including hardware, installation, configuration, administration. The book also addresses advanced maintenance and security topics. The topics are presented in an easy to understand fashion, offering specific solutions to various problems an administrator or user might encounter. The book provides concrete examples for a variety of common tasks or problems. Three popular network environments-Windows NT/2000, Unix/Linux and NetWare-receive primary focus in the book. The book also provides coverage of integrating multiple operating systems and establishing simple mini-LANs.


Saturday, November 5, 2011

Guide to Bluetooth security: recommendations of the National Institute of Standards and Technology

Guide to Bluetooth security: recommendations of the National Institute of Standards and Technology Review



Original publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2008] OCLC Number: (OCoLC)712603834 Subject: Bluetooth technology. Excerpt: ... UIDE TO LUETOOTH ECURITY G B S 3. Bluetooth Security Features This section provides an overview of the security mechanisms included in the Bluetooth specifications to illustrate their limitations and provide a foundation for some of the security recommendations in Section 4. A high-level example of the scope of the security for the Bluetooth radio path is depicted in Figure 3-1. In this example, Bluetooth security is provided only between the mobile phone and the laptop computer, while IEEE 802.11 security protects the wireless local area network link between the laptop and the IEEE 802.11 AP. However, the communications on the wired network are not protected by Bluetooth or IEEE 802.11 security capabilities. End-to-end security is not possible without using higher-layer security solutions in addition to the security features included in the Bluetooth specification and IEEE 802.11 standards. Figure 3-1. Bluetooth Air-Interface Security The following are the three basic security services specified in the Bluetooth standard:�Authentication: verifying the identity of communicating devices. User authentication is not provided natively by Bluetooth.�Confidentiality: preventing information compromise caused by eavesdropping by ensuring that only authorized devices can access and view data.�Authorization: allowing the control of resources by ensuring that a device is authorized to use a service before permitting it to do so. The three security services offered by Bluetooth and details about the modes of security are described below. Bluetooth does not address other security services such as audit and non-repudiation; if such services are needed, they must be provided through additional means. 3-1


Monday, October 31, 2011

Penetration Tester's Open Source Toolkit, Vol. 2

Penetration Tester's Open Source Toolkit, Vol. 2 Review



Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pentesting applications included with BackTrack 2 to the pen tester's toolkit. It includes the latest information on Snort, Nessus, Wireshark, Metasploit, Kismet and all of the other major Open Source platforms.

. Perform Network Reconnaissance
Master the objectives, methodology, and tools of the least understood aspect of a penetration test.
. Demystify Enumeration and Scanning
Identify the purpose and type of the target systems, obtain specific information about the versions of the services that are running on the systems, and list the targets and services.
. Hack Database Services
Understand and identify common database service vulnerabilities, discover database services, attack database authentication mechanisms, analyze the contents of the database, and use the database to obtain access to the host operating system.
. Test Web Servers and Applications
Compromise the Web server due to vulnerabilities on the server daemon itself, its unhardened state, or vulnerabilities within the Web applications.
. Test Wireless Networks and Devices
Understand WLAN vulnerabilities, attack WLAN encryption, master information gathering tools, and deploy exploitation tools.
. Examine Vulnerabilities on Network Routers and Switches
Use Traceroute, Nmap, ike-scan, Cisco Torch, Finger, Nessus, onesixtyone, Hydra, Ettercap, and more to attack your network devices.
. Customize BackTrack 2
Torque BackTrack 2 for your specialized needs through module management, unique hard drive installations, and USB installations.
. Perform Forensic Discovery and Analysis with BackTrack 2
Use BackTrack in the field for forensic analysis, image acquisition, and file carving.
. Build Your Own PenTesting Lab
Everything you need to build your own fully functional attack lab.


Sunday, October 30, 2011

Practical WAP: Developing Applications for the Wireless Web (Breakthroughs in Application Development)

Practical WAP: Developing Applications for the Wireless Web (Breakthroughs in Application Development) Review



This is an intermediate-level guide to building WAP applications. The Wireless Application Protocol (WAP) provides the technological framework for combining mobile communications with Internet technologies. WAP opens up the Web to a vastly expanded audience, allowing new types of applications to take advantage of user location, provide time-critical information, and offer personalized content. This book details the WAP Forum, mobile devices, and what makes a good WAP application. Using real world examples, this book examines the WAP standards, focusing on those essential to building working WAP applications. It outlines the critical success factors in designing WAP applications and helps the reader select the right architecture for his or her WAP project. Complete tutorials on WML (the HTML of wireless web), WMLScript, and Push technology are combined with the many examples to make Practical Wap ideal for software developers, architects, and managers.


Thursday, October 27, 2011

Ghost Huntress Book 2: The Guidance

Ghost Huntress Book 2: The Guidance Review



Ghost Huntress Book 2: The Guidance Feature

  • ISBN13: 9780547150949
  • Condition: New
  • Notes: BRAND NEW FROM PUBLISHER! 100% Satisfaction Guarantee. Tracking provided on most orders. Buy with Confidence! Millions of books sold!
Kendall and her ghost hunting team is the talk of Radisson, Georgia, but one person isn’t so pleased. Courtney Langdon doesn’t appreciate Kendall’s new popularity or her relationship with Jason, Courtney’s ex.

So Courtney begins dabbling in the paranormal world. At first it’s all a game to draw attention away from Kendall. But Courtney doesn’t know what she’s getting into—or what wants in her. This is one game that’s about to turn deadly serious.

And for more about Kendall and the ghost huntresses, check out www.ghosthuntress.com!


Wednesday, October 26, 2011

Extreme NXT: Extending the LEGO MINDSTORMS NXT to the Next Level (Technology in Action)

Extreme NXT: Extending the LEGO MINDSTORMS NXT to the Next Level (Technology in Action) Review



Extreme NXT: Extending the LEGO MIDSTORMS NXT to the Next Level is for intermediate-level users of NXT who would like to advance their capabilities by learning some of the basics of electronics. Plenty of examples are provided, and easy-to-follow instructions are included for building over 15 different sensors.

This makes a great reference for the NXT hardware interfaces. Examples even come complete with multiple, alternative NXT languages. The book is also abundant with illustrations.