Browse Results

Showing 8,451 through 8,475 of 61,787 results

Bits of Power: Issues in Global Access to Scientific Data

by Committee on Issues in the Transborder Flow of Scientific Data

Since Galileo corresponded with Kepler, the community of scientists has become increasingly international. A DNA sequence is as significant to a researcher in Novosibirsk as it is to one in Pasadena. And with the advent of electronic communications technology, these experts can share information within minutes. What are the consequences when more bits of scientific data cross more national borders and do it more swiftly than ever before? Bits of Power assesses the state of international exchange of data in the natural sciences, identifying strengths, weaknesses, and challenges. The committee makes recommendations about access to scientific data derived from public funding. The volume examines: Trends in the electronic transfer and management of scientific data. Pressure toward commercialization of scientific data, including the economic aspects of government dissemination of the data. The implications of proposed changes to intellectual property laws and the role of scientists in shaping legislative and legal solutions. Improving access to scientific data by and from the developing world. Bits of Power explores how these issues have been addressed in the European Community and includes examples of successful data transfer activities in the natural sciences. The book will be of interest to scientists and scientific data managers, as well as intellectual property rights attorneys, legislators, government agencies, and international organizations concerned about the electronic flow of scientific data.

Bits on Chips

by Harry Veendrick

This book provides readers with a broad overview of integrated circuits, also generally referred to as micro-electronics. The presentation is designed to be accessible to readers with limited, technical knowledge and coverage includes key aspects of integrated circuit design, implementation, fabrication and application. The author complements his discussion with a large number of diagrams and photographs, in order to reinforce the explanations. The book is divided into two parts, the first of which is specifically developed for people with almost no or little technical knowledge. It presents an overview of the electronic evolution and discusses the similarity between a chip floor plan and a city plan, using metaphors to help explain concepts. It includes a summary of the chip development cycle, some basic definitions and a variety of applications that use integrated circuits. The second part digs deeper into the details and is perfectly suited for professionals working in one of the semiconductor disciplines who want to broaden their semiconductor horizon.

Bits to Bitcoin: How Our Digital Stuff Works (The\mit Press Ser.)

by Mark Stuart Day

An accessible guide to our digital infrastructure, explaining the basics of operating systems, networks, security, and other topics for the general reader.Most of us feel at home in front of a computer; we own smartphones, tablets, and laptops; we look things up online and check social media to see what our friends are doing. But we may be a bit fuzzy about how any of this really works. In Bits to Bitcoin, Mark Stuart Day offers an accessible guide to our digital infrastructure, explaining the basics of operating systems, networks, security, and related topics for the general reader. He takes the reader from a single process to multiple processes that interact with each other; he explores processes that fail and processes that overcome failures; and he examines processes that attack each other or defend themselves against attacks. Day tells us that steps are digital but ramps are analog; that computation is about “doing something with stuff” and that both the “stuff” and the “doing” can be digital. He explains timesharing, deadlock, and thrashing; virtual memory and virtual machines; packets and networks; resources and servers; secret keys and public keys; Moore's law and Thompson's hack. He describes how building in redundancy guards against failure and how endpoints communicate across the Internet. He explains why programs crash or have other bugs, why they are attacked by viruses, and why those problems are hard to fix. Finally, after examining secrets, trust, and cheating, he explains the mechanisms that allow the Bitcoin system to record money transfers accurately while fending off attacks.

Bits und Bytes in Mikrochips: Grundlagen der Technischen Informatik am Beispiel moderner Hardware

by Klaus Brüderle

Dieses Lehrbuch bietet einen gut verständlichen Einstieg in die technischen Grundlagen der Informatik, ohne tiefgehende mathematische Vorkenntnisse vorauszusetzen. Dank zahlreicher Übungen und Lösungen eignet sich das Buch hervorragend zum Selbststudium.Neben Grundkenntnissen der Computertechnik werden ebenso die technischen Grundlagen der Industrie 4.0 vermittelt. Ob Sie sich im Studium oder in der Ausbildung befinden, sich für digitale Berufe umqualifizieren möchten oder einfach ein interessierter Laie sind, dieses Buch unterstützt Sie bei Ihrer digitalen Weiterbildung.

Bits und Bytes in Mikrochips: Grundlagen der Technischen Informatik am Beispiel moderner Hardware

by Klaus Brüderle

Dieses Lehrbuch bietet einen gut verständlichen Einstieg in die technischen Grundlagen der Informatik, ohne tiefgehende mathematische Vorkenntnisse vorauszusetzen. Dank zahlreicher Übungen und Lösungen eignet sich das Buch hervorragend zum Selbststudium. Neben Grundkenntnissen der Computertechnik werden ebenso die technischen Grundlagen der Industrie 4.0 vermittelt. Ob Sie sich im Studium oder in der Ausbildung befinden, sich für digitale Berufe umqualifizieren möchten oder einfach ein interessierter Laie sind, dieses Buch unterstützt Sie bei Ihrer digitalen Weiterbildung. Der Inhalt Zeichen und Bits im Computer: Mensch und Maschine Verbindung der Chips (bis PCIe 7.0 und CXL, bis USB4 2.0 und Thunderbolt 5) Datenträger (HD, PCIe-5.0-SSDs), IOPS, Flash-Technik und Chipsätze bis Intel Serie-700 Arbeitsspeicher bis DDR5, XMP, SO-DIMM, LPDDR-SDRAM, CAMM und Konfiguration des DDR- und LPDDR-SDRAM (Intel, bis Core i-14000(K)) – Zwischenspeicher (Cache) Prozessor-Technologien: Single- und Multithreading, TDP, Power Limits bis 14. CPU-Gen (Raptor Lake Refresh), PWM-Regelung, alles über 12. bis 14. CPU-Generation, Total Hybrid: Chiplets (Tiles), 14. CPU-Mobil-Gen. Core Ultra (Serie 1) Meteor Lake Künstliche Intelligenz: Inferencing, Machine Learning, Datenformate (FP16, BF16 usw.), KI-Rechenwerke der CPU, der GPU und NPU Embedded (Mini PCs usw.) Core Ultra (Hybrid, Serie 1) Elektrischer Strom, Spannung, Leistung, Kondensator usw. Anhang von A (API …) über S (Supercomputer …) bis W (Workstationen) Die Zielgruppen An digitaler Weiterbildung Interessierte Schüler*innen mit dem Fach Informatik Schüler*innen an Berufsfachschulen, Technikerschulen mit Schwerpunkt Informatik und Informatik-Profil-Schulen (IPS) Techniker-Lehrgänge (DAA-Technikum, Fachinformatiker) Studierende der Fächer Informatik, Mechatronik u. a. Der Autor Dipl. Ing. (FH) Klaus Brüderle war ​Lehrer für Physik und Informatik und verfügt über vier Jahrzehnte Erfahrung in der IT-Bildung.

Bits, Bytes, and Balance Sheets: The New Economic Rules of Engagement in a Wireless World

by Walter B. Wriston

This follow-up to the author's Twilight of Sovereignty explores the consequences of the changes produced by the new economy of the Internet, defining the new rules and examining some of the promising initiatives under way to create a system of measuring and valuing assets that reflects our new economic realities. Wriston shows that in today's economy, intellectual capital is more important than physical capital—and that businesses must adapt to this change or perish.

Bitwise: A Life in Code

by David Auerbach

An exhilarating, elegant memoir and a significant polemic on how computers and algorithms shape our understanding of the world and of who we are Bitwise is a wondrous ode to the computer lan­guages and codes that captured technologist David Auerbach’s imagination. With a philoso­pher’s sense of inquiry, Auerbach recounts his childhood spent drawing ferns with the pro­gramming language Logo on the Apple IIe, his adventures in early text-based video games, his education as an engineer, and his contribu­tions to instant messaging technology devel­oped for Microsoft and the servers powering Google’s data stores. A lifelong student of the systems that shape our lives—from the psy­chiatric taxonomy of the Diagnostic and Statistical Manual to how Facebook tracks and profiles its users—Auerbach reflects on how he has experienced the algorithms that taxonomize human speech, knowledge, and behavior and that compel us to do the same. Into this exquisitely crafted, wide-ranging memoir of a life spent with code, Auerbach has woven an eye-opening and searing examina­tion of the inescapable ways in which algo­rithms have both standardized and coarsened our lives. As we engineer ever more intricate technology to translate our experiences and narrow the gap that divides us from the ma­chine, Auerbach argues, we willingly erase our nuances and our idiosyncrasies—precisely the things that make us human.

BizTalk 2013 EDI for Health Care: HIPAA-Compliant 834 (Enrollment) and 837 (Claims) Solutions

by Mark Beckner

BizTalk 2013 EDI for Healthcare - EDI 834Enrollment Solutions eliminates the complexity anddemonstrates how to build both inbound and outbound EDI 834 processes inBizTalk server that follow the required patterns for integrations with theseexchanges. Archiving, mapping,reconstituting EDI 837 data, exception handling and advanced logging andreporting (without the need for BAM!) are all covered in enough detail to allowyou to implement your own fully functional solution. The Affordable CareAct and the requirements to integrate with state Exchanges have securedBizTalk's role with integrations within the healthcare industry. EDI 834 documents are the heart to allintegrations, dealing with enrollment and the maintenance of enrollments. In order to successfully integrate with theexchanges, companies are required to implement a number of architectural componentsthat can be daunting and complex to work through. High-quality resources for IT professional to handle these challenges are sorely needed, and this resource has been designed to provide concise solutions. What you'll learn Learn how to develop complete end to end EDI 834 solutions, both inbound and outbound Create a solution that demonstrates how to integrate with state Exchanges Explore options for custom pipeline components, archiving patterns, lookups Detailed information for advanced 834 EDI mapping Who this book is for BizTalk administrators and developers, as well as management personnel connected with these positions. Table of Contents 1. Architectural Patterns 2. Solution: Receiving 837P Data 3. Solution: Sending 837P Data 4. Mapping Data 5. Adapters, AS2 and Acks 6. Solution: Receiving 834 Data 7. Pipelines for 834 Processing 8. Custom Business Rules 9. Advanced 834 Mapping 10. Solution: Sending 834 Data 11. Solution: Sending 834 Data, Simplified

BizTalk 2013 Recipes: A Problem-Solution Approach

by Mark Beckner Kishore Dharanikota

BizTalk 2013 Recipes provides ready-made solutions to BizTalk Server 2013 developers. The recipes in the book save you the effort of developing your own solutions to common problems that have been solved many times over. The solutions demonstrate sound practice, the result of hard-earned wisdom by those who have gone before. Presented in a step-by-step format with clear code examples and explanations, the solutions in BizTalk 2013 Recipes help you take advantage of new features and deeper capabilities in BizTalk Server 2013. You'll learn to integrate your solutions with the cloud, configure BizTalk on Azure, work with electronic data interchange (EDI), and deploy the growing range of adapters for integrating with the different systems and technologies that you will encounter. You'll find recipes covering all the core areas: schemas, maps, orchestrations, messaging and more. BizTalk Server 2013 is Microsoft's market-leading platform for orchestrating process flow across disparate applications. BizTalk 2013 Recipes is your key to unlocking the full power of that platform. What you'll learn Automate business processes across different systems in your enterprise. Build, test, and deploy complex maps and schemas. Implement the business rules engine (BRE). Develop business activity monitoring (BAM) solutions. Manage electronic data interchange (EDI) with trading partners. Monitor and troubleshoot automated processes. Deploy BizTalk to Azure and build cloud based solutions. Who this book is for BizTalk 2013 Recipes is aimed at developers working in Microsoft BizTalk Server 2013. Experienced BizTalk developers will find great value in the information around new functionality in the 2013 release such as that for cloud based integrations. Those brand new to BizTalk will appreciate the clear examples of core functionality that help them understand how best to design and deploy BizTalk Server solutions. Table of Contents What's New in BizTalk Server 2013 Document Schemas Document Mapping Messaging and Pipelines Orchestrations Adapters Business Rules Framework EDI Solutions Cloud Solutions Deployment Administration and Operations Business Activity Monitoring

BizTalk Server 2010 Cookbook

by Steef-Jan Wiggers

This book will explain step-by-step in each recipe how to, for example, implement a certain orchestration pattern, test a BizTalk artifact, monitor BizTalk with a third party tool, or secure a message. The recipes in this book are easy to understand and follow as the author discusses real-world scenarios. The range of topics covered in this book will bring out the forward-thinking BizTalk developer in you. The examples are supported by relevant background information for ease of understanding. This book is for professional BizTalk Developers and administrators to take their skills to the next level and explore the numerous capabilities BizTalk has. This book assumes that you have a basic understanding of BizTalk and SOA and BPM concepts.

Black Box Optimization, Machine Learning, and No-Free Lunch Theorems (Springer Optimization and Its Applications #170)

by Panos M. Pardalos Varvara Rasskazova Michael N. Vrahatis

This edited volume illustrates the connections between machine learning techniques, black box optimization, and no-free lunch theorems. Each of the thirteen contributions focuses on the commonality and interdisciplinary concepts as well as the fundamentals needed to fully comprehend the impact of individual applications and problems. Current theoretical, algorithmic, and practical methods used are provided to stimulate a new effort towards innovative and efficient solutions. The book is intended for beginners who wish to achieve a broad overview of optimization methods and also for more experienced researchers as well as researchers in mathematics, optimization, operations research, quantitative logistics, data analysis, and statistics, who will benefit from access to a quick reference to key topics and methods. The coverage ranges from mathematically rigorous methods to heuristic and evolutionary approaches in an attempt to equip the reader with different viewpoints of the same problem.

Black Code: Surveillance, Privacy, and the Dark Side of the Internet

by Ronald J. Deibert

Cyberspace is all around us. We depend on it for everything we do. We have reengineered our business, governance, and social relations around a planetary network unlike any before it. But there are dangers looming, and malign forces are threatening to transform this extraordinary domain.In Black Code, Ronald J. Deibert, a leading expert on digital technology, security, and human rights, lifts the lid on cyberspace and shows what's at stake for Internet users and citizens. As cyberspace develops in unprecedented ways, powerful agents are scrambling for control. Predatory cyber criminal gangs such as Koobface have made social media their stalking ground. The discovery of Stuxnet, a computer worm reportedly developed by Israel and the United States and aimed at Iran's nuclear facilities, showed that state cyberwar is now a very real possibility. Governments and corporations are in collusion and are setting the rules of the road behind closed doors.This is not the way it was supposed to be. The Internet's original promise of a global commons of shared knowledge and communications is now under threat. Drawing on the first-hand experiences of one of the most important protagonists in the battle -- the Citizen Lab and its global network of frontline researchers, who have spent more than a decade cracking cyber espionage rings and uncovering attacks on citizens and NGOs worldwide -- Black Code takes readers on a fascinating journey into the battle for cyberspace. Thought-provoking, compelling, and sometimes frightening, it is a wakeup call to citizens who have come to take the Internet for granted. Cyberspace is ours, it is what we make of it, Deibert argues, and we need to act now before it slips through our grasp.

Black Hat Bash: Creative Scripting for Hackers and Pentesters

by Nick Aleks Dolev Farhi

Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land attacks, and more!In the hands of the penetration tester, bash scripting becomes a powerful offensive security tool. In Black Hat Bash, you&’ll learn how to use bash to automate tasks, develop custom tools, uncover vulnerabilities, and execute advanced, living-off-the-land attacks against Linux servers. You&’ll build a toolbox of bash scripts that will save you hours of manual work. And your only prerequisite is basic familiarity with the Linux operating system.You&’ll learn the basics of bash syntax, then set up a Kali Linux lab to apply your skills across each stage of a penetration test—from initial access to data exfiltration. Along the way, you&’ll learn how to perform OS command injection, access remote machines, gather information stealthily, and navigate restricted networks to find the crown jewels. Hands-on exercises throughout will have you applying your newfound skills.Key topics covered include:Bash scripting essentials: From control structures, functions, loops, and text manipulation with grep, awk, and sed.How to set up your lab: Create a hacking environment with Kali and Docker and install additional tools.Reconnaissance and vulnerability scanning: Learn how to perform host discovery, fuzzing, and port scanning using tools like Wfuzz, Nmap, and Nuclei.Exploitation and privilege escalation: Establish web and reverse shells, and maintain continuous access.Defense evasion and lateral movement: Audit hosts for landmines, avoid detection, and move through networks to uncover additional targets.Whether you&’re a pentester, a bug bounty hunter, or a student entering the cybersecurity field, Black Hat Bash will teach you how to automate, customize, and optimize your offensive security strategies quickly and efficiently, with no true sorcery required.

Black Hat Go: Go Programming For Hackers and Pentesters

by Tom Steele Chris Patten Dan Kottmann

Like the best-selling Black Hat Python, Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset.Black Hat Go explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability. It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset, all using the power of Go.You'll begin your journey with a basic overview of Go's syntax and philosophy and then start to explore examples that you can leverage for tool development, including common network protocols like HTTP, DNS, and SMB. You'll then dig into various tactics and problems that penetration testers encounter, addressing things like data pilfering, packet sniffing, and exploit development. You'll create dynamic, pluggable tools before diving into cryptography, attacking Microsoft Windows, and implementing steganography.You'll learn how to:Make performant tools that can be used for your own security projectsCreate usable tools that interact with remote APIsScrape arbitrary HTML dataUse Go's standard package, net/http, for building HTTP serversWrite your own DNS server and proxyUse DNS tunneling to establish a C2 channel out of a restrictive networkCreate a vulnerability fuzzer to discover an application's security weaknessesUse plug-ins and extensions to future-proof productsBuild an RC2 symmetric-key brute-forcerImplant data within a Portable Network Graphics (PNG) image.Are you ready to add to your arsenal of security tools? Then let's Go!

Black Hat GraphQL: Attacking Next Generation APIs

by Nick Aleks Dolev Farhi

Written by hackers for hackers, this hands-on book teaches penetration testers how to identify vulnerabilities in apps that use GraphQL, a data query and manipulation language for APIs adopted by major companies like Facebook and GitHub.Black Hat GraphQL is for anyone interested in learning how to break and protect GraphQL APIs with the aid of offensive security testing. Whether you&’re a penetration tester, security analyst, or software engineer, you&’ll learn how to attack GraphQL APIs, develop hardening procedures, build automated security testing into your development pipeline, and validate controls, all with no prior exposure to GraphQL required.Following an introduction to core concepts, you&’ll build your lab, explore the difference between GraphQL and REST APIs, run your first query, and learn how to create custom queries.You&’ll also learn how to:Use data collection and target mapping to learn about targets Defend APIs against denial-of-service attacks and exploit insecure configurations in GraphQL servers to gather information on hardened targetsImpersonate users and take admin-level actions on a remote serverUncover injection-based vulnerabilities in servers, databases, and client browsersExploit cross-site and server-side request forgery vulnerabilities, as well as cross-site WebSocket hijacking, to force a server to request sensitive information on your behalfDissect vulnerability disclosure reports and review exploit code to reveal how vulnerabilities have impacted large companiesThis comprehensive resource provides everything you need to defend GraphQL APIs and build secure applications. Think of it as your umbrella in a lightning storm.

Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters

by Tim Arnold Justin Seitz

Fully-updated for Python 3, the second edition of this worldwide bestseller (over 100,000 copies sold) explores the stealthier side of programming and brings you all new strategies for your hacking projects.When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. In Black Hat Python, 2nd Edition, you&’ll explore the darker side of Python&’s capabilities—writing network sniffers, stealing email credentials, brute forcing directories, crafting mutation fuzzers, infecting virtual machines, creating stealthy trojans, and more. The second edition of this bestselling hacking book contains code updated for the latest version of Python 3, as well as new techniques that reflect current industry best practices. You&’ll also find expanded explanations of Python libraries such as ctypes, struct, lxml, and BeautifulSoup, and dig deeper into strategies, from splitting bytes to leveraging computer-vision libraries, that you can apply to future hacking projects. You&’ll learn how to: • Create a trojan command-and-control using GitHub • Detect sandboxing and automate common malware tasks, like keylogging and screenshotting • Escalate Windows privileges with creative process control • Use offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machine • Extend the popular Burp Suite web-hacking tool • Abuse Windows COM automation to perform a man-in-the-browser attack • Exfiltrate data from a network most sneakily When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how with the second edition of Black Hat Python. New to this edition:All Python code has been updated to cover Python 3 and includes updated libraries used in current Python applications. Additionally, there are more in-depth explanations of the code and the programming techniques have been updated to current, common tactics. Examples of new material that you'll learn include how to sniff network traffic, evade anti-virus software, brute-force web applications, and set up a command-and-control (C2) system using GitHub.

Black Hat Python: Python Programming for Hackers and Pentesters

by Justin Seitz

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you’ll explore the darker side of Python’s capabilities—writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more.You’ll learn how to:–Create a trojan command-and-control using GitHub–Detect sandboxing and automate com­mon malware tasks, like keylogging and screenshotting–Escalate Windows privileges with creative process control–Use offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machine–Extend the popular Burp Suite web-hacking tool–Abuse Windows COM automation to perform a man-in-the-browser attack–Exfiltrate data from a network most sneakilyInsider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits.When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python.Uses Python 2

Black Ice: The Invisible Threat of Cyber-Terrorism

by Dan Verton

The first book to define the clear and present danger posed by a cyber-terrorist attack on the U.S. computer- and network-dependent infrastructure. The pages are packed with interviews from members of terrorist groups, including al-Qaida, as well as key insiders involved in planning and executing the U.S. plan for the defense of cyberspace, including Tom Ridge, James Gilmore, CIA and NSA officials--and even al-Qaeda supporters. Internet security expert Dan Verton investigates how cyber-terrorism could occur, what the global and financial implications are, the impact this is having and will continue to have on privacy and civil liberties, and how to prepare and prevent against cyber-terrorism.

Black and White Digital Photography Photo Workshop

by Chris Bucher

How to create stunning black and white photos in a digital format Shooting pictures in black and white presents unique challenges for beginners and experienced digital photographers alike. A strong understanding of photography's fundamentals is crucial to capturing great black and white images, and factors such as contrast and lighting are much more integral to black and white photography than to color. Black and White Digital Photography Photo Workshop teaches digital photographers the skills they need to master black and white photography. Focuses on the rules of photography and how they apply differently to black and white photography Offers guidance for properly uploading digital images to a computer Explains insider tips and tricks for using Photoshop and Lightroom to successfully enhance black and white images Black and white photography presents different challenges than color photography. In Black and White Digital Photography Photo Workshop, photographers learn how to identify great opportunities for black and white photographs and how to turn those opportunities into stunning monochrome images they can be proud to display.

Black and White in Photoshop CS4 and Photoshop Lightroom: A complete integrated workflow solution for creating stunning monochromatic images in Photoshop CS4, Photoshop Lightroom, and beyond

by Leslie Alsheimer Bryan O'Neil Hughes

In the highly anticipated second edition of this groundbreaking book, NAPP GURU award recipient and professional photographer Leslie Alsheimer and Adobe's own Bryan O'Neil Hughes show you everything you need to know to uncover the secrets to successful black and white conversion and printmaking. This comprehensive reference will help you maximize your workflow with coverage of all of the relevant new features of Photoshop CS4 and Lightroom 2, including every stage of the black and white process from capture to printing. Along the way, you'll find in-depth explanations of key topics such as color management, optimizing your workspace, softproofing and calibration (both onscreen and for output), evaluating histograms, non-destructive editing, and much more. New features in this edition include:.In-depth coverage of workflow using the Bridge and Adobe Camera RAW components of CS4.New recipes and tips for advanced black and white conversion .Coverage of Lightroom and Photoshop integration features.An overview of scanners and scanning your black and white film.Advice on exposure essentials and how to apply the Zone System to your digital shooting .A brand new chapter on black and white and creative image editing in LightroomBreathtaking color and black and white photographs, including Leslie Alsheimer's image which won the coveted Vincent Versace award at Photoshop World in 2008, will inspire you to expand your own creativity to limitless possibilities. This is the essential resource for any photographer shooting black and white in the digital age.

BlackBerry All-in-One For Dummies

by Dante Sarigumba Robert Kao William Petz Timothy Calabro

Go beyond BlackBerry basics and get everything your BlackBerry can deliverBlackBerry is the leading smartphone for business users, and its popularity continues to explode. When you discover the amazing array of BlackBerry possibilities in this fun and friendly guide, you'll be even happier with your choice of smartphones.BlackBerry All-in-One For Dummies explores every feature and application common to all BlackBerry devices. It explains the topics in depth, with tips, tricks, workarounds, and includes detailed information about cool new third-party applications, accessories, and downloads that can't be missed.With several models available, the BlackBerry is the most popular smartphone for business users and that market continues to growThis guide covers the basics common to all models and explores individual features in depthExamines social networking applications, navigation, organizing contacts and the calendar, and synchronization issuesDelves into multimedia, including e-mail, photos, and the media playerExplores GPS, the internet and connectivity, great downloads, how to maximize third-party applications, and application developmentUses graphs, tables, and images to fully explain the features of each modelAuthor team is directly involved with BlackBerry application developmentBlackBerry All-in-One For Dummies helps you take full advantage of everything your BlackBerry device can do for you.

BlackBerry Application Development For Dummies

by Karl G. Kowalski

The first introductory book to developing apps for the BlackBerry If you're eager to start developing applications for the BlackBerry, then this is the hands-on book for you! Aimed directly at novice developers, this beginner guide introduces you to the basics of the BlackBerry API and shows you how to create a user interface, store and sync data, optimize code, manage applications, connect to a network, create enterprise applications using MDS Studio, create Web content, and more. Packed with examples, this straightforward guide takes you from the beginning of the BlackBerry application cycle completely to the end. Guides you through the process of developing applications for the BlackBerry Presents an overview of the BlackBerry, including detailed explanations on the architecture and an in-depth look at the programming API Introduces MDS Studio, which is the latest tool from RIM for building enterprise applications Offers novice developers numerous reusable code examples that can be immediately used Explains how to store and sync data, optimize code, manage applications, connect to networks, and more BlackBerry Application Development For Dummies puts you well on your way to creating BlackBerry apps the fun and easy way!

BlackBerry Bold For Dummies

by Dante Sarigumba Robert Kao

Set up your BlackBerry Bold, get online, get organized, and manage your lifeThe BlackBerry is the number one smartphone in the corporate world. Feature-rich and complex, the Bold is among the most popular handhelds for business users.BlackBerry Bold For Dummies covers the GPS, Wi-Fi, mobile streaming, HSDPA network speed, Media Sync, and dozens of other features that make BlackBerry Bold the #1 choice of workers on the go.Shows how to use the QWERTY keyboard and send and receive e-mail and PIN to PIN messagesExplains how to manage your calendar, appointments, and contacts on the BoldProvides tips on taking photos, making phone calls, using the Media Player, and surfing the WebCovers interconnecting applications, syncing with your desktop, and getting where you're going using BlackBerry Maps and GPSIncludes practical information about power usage as well as tips on navigating the Bold interfaceDemonstrates using the enhanced BlackBerry Messenger feature to instant message, chat with groups, check availability of your contacts, and track delivery of your messagesWhether you're new to the BlackBerry family or are upgrading from an earlier BlackBerry model, you'll discover that BlackBerry Bold For Dummies helps you get more done and have more fun with your BlackBerry Bold.

BlackBerry Curve For Dummies

by Dante Sarigumba Robert Kao

Get the most from your BlackBerry Curve with this easy-to-understand reference The BlackBerry Curve smartphone is the most popular BlackBerry model sold by Research in Motion. It boasts an optical trackpad, dedicated media keys, easy media sharing, Mac compatibility, iTunes synchronization, a camera, Wi-Fi calling, and extended battery life-to name just a few features. This fun, friendly, and easy-to-understand book is a practical guide to the BlackBerry Curve and covers an array of how-to topics to help you get the most out of this exciting handheld device. You'll learn the parts of the Curve, how to navigate the QWERTY keyboard, set up contacts and make appointments, download the latest applications, take great pictures, take advantage of the expandable memory, and much more. Serves as a practical, hands-on guide to the BlackBerry Curve smartphoneCovers all current and newly introduced models of the BlackBerry Curve Shows how to get online and surf the Web, manage e-mail, and create a to-do list Demonstrates navigation tips and shortcuts Guides you through upgrades to the newest Curve models Explains how to take advantage of the expandable memory, get multimedia, and download apps from BlackBerry App World Walks you through syncing your BlackBerry with your desktop Avoid the learning curve with this helpful guide to the BlackBerry Curve!

BlackBerry Enterprise Server 5 Implementation Guide

by Mitesh Desai

This book combines clear factual information with easy-to-use step-by-step instructions. There are chapters with background information on the architecture and features of the BlackBerry Enterprise Server, and chapters with specific installation and configuration instructions. This combined approach gives you the knowledge to make the best implementation decisions for your environment.This book is written for IT professionals and network administrators who need to implement a BlackBerry Enterprise Server. The text assumes basic familiarity with Microsoft Windows Server administration, but provides detailed instructions for administrators with varying levels of experience.

Refine Search

Showing 8,451 through 8,475 of 61,787 results