The iPod and iTunes are the hottest technologies in the world of digital music today. Whether you're a Mac or Windows user, the iPod and iTunes Starter Kit provides all the information that you need to get the most out these amazing digital music tools, including the Apple iTunes Music Store. From the basics of...
With a new plug-in that re-creates the sounds of 11 of the world's best-known guitar amps, distributed audio processing (which lets you tap into a virtually unlimited number of Macs), new software instruments (including a killer drum machine), and a slew of workflow enhancements, it's no wonder you're chomping at the bit to start using Logic Pro 7...
A virtual evolution in IT organizations throughout the world has begun. It is estimated that currently 3% of all servers run virtually and that number is expected to grow rapidly over the next 5 years. VMware's ESX server is the enterprise tool that provides the platform on which a complete virtual infrastructure can be designed,...
A complete guide to the law of open source for developers, managers, and lawyers
Now that open source software is blossoming around the world, it is crucial to understand how open source licenses work—and their solid legal foundations. Open Source Initiative general counsel Lawrence Rosen presents a plain-English guide to open source law...
"What is mind?" "Can we build synthetic or artificial minds?" Think these questions are only reserved for Science Fiction? Well, not anymore. This collection presents a diverse overview of where the development of artificial minds is as the twenty first century begins. Examined from nearly all viewpoints, Visions of Mind...
Google Hacking for Penetration Testers explores the explosive growth of a technique known as "Google Hacking." This simple tool can be bent by hackers and those with malicious intents to find hidden information, break into sites, and access supposedly secure information. Borrowing the techniques pioneered by malicious...
Praise for Philip Kotler’s MARKETING INSIGHTS FROM A to Z
"There’s only one name in marketing: Phil Kotler. His latest may be his best–a summa that captures the best of his insights, as original today as when he first took pen in hand, forty years ago." –Tom Peters, author of In Search of Excellence and...
Now there's a definitive insider's guide to planning, installing, configuring, and maintaining the newest version of the world's #1 firewall: Check Point™ FireWall-1® Next Generation™. Leading Check Point support authority Dameon Welch-Abernathy (a.k.a. PhoneBoy) offers exclusive hands-on tips, techniques, checklists, and...
Oracle DBAs and developers are all too familiar with the outlay of time and resources, blown budgets, missed deadlines, and marginally effective performance fiddling that is commonplace with traditional methods of Oracle performance tuning. In Optimizing Oracle Performance, Cary Millsap, former VP of Oracle's System...
The Cisco Security Agent product is extremely successful in protecting endpoints around the world. The power it provides must be understood to use it effectively and efficiently. This book attempts to provide guidance and examples to help CSA users worldwide do just that.
This book is intended for anyone currently using the CSA...
In the wake of the highly successful Sams Teach Yourself Unix in 24 Hours, this book focuses on the additional Unix commands that an advanced user or beginning system administrator needs to know in order to administer and maintain a Unix system. The book includes coverage of the key Unix variations: Red Hat Linux, Solaris, HPUX, and Apple's Mac...
Need to make sense of the many changes to Visual Basic for the new .NET platform? VB .NET Language in a Nutshell introduces the important aspects of the language and explains the .NET framework. An alphabetical reference covers the functions, statements, directives, objects, and object members that make up the VB .NET language. To...