Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Home Networking & Security


1. 

Identity Theft Alert: 10 Rules You Must Follow to Protect Yourself from America’s #1 Crime

Identity Theft Alert: 10 Rules You Must Follow to Protect Yourself from America’s #1 Crime

By: Steve Weisman

Publisher: FT Press

Publication Date: 11-JUL-2014

Insert Date: 10-MAY-2014

Slots: 1.0

Table of Contents • Start Reading

Protect yourself from identity theft!  Nearly 17 million Americans were victimized by identity theft in 2012 alone: for 13 straight years, it has been America's #1 consumer crime. No one is immune: children, the elderly and even the dead have been victimized. Identity theft can be high-tech, low-tech, or even no tech, via "dumpster diving." You're vulnerable, and you need to act. Fortunately, you can take practical steps to safeguard your identity right now. In Identity Theft Alert, award-winning author and attorney Steve Weisman shows you exactly what  to do, and how to do it. Equally...

2. 

The Basics of Digital Privacy

The Basics of Digital Privacy

By: Denny Cherry

Publisher: Syngress

Publication Date: 21-NOV-2013

Insert Date: 26-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Who’s watching you online? These days, it’s hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy. The Basics of Digital Privacy teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, and he will introduce you to the basic concepts of protecting your identity, your financial data, and your personal...

3. 

Data Protection for Photographers

Data Protection for Photographers

By: 

Publisher: Rocky Nook

Publication Date: 27-FEB-2014

Insert Date: 28-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

All photographers, both amateur and professional, are faced with the important issues of data protection and storage. Without knowledge of the options, tools, and procedures for safe and effective image protection and storage, photographers run the serious risk of losing their image files. This book offers critical information about the best hardware, software, procedures, and practices for capturing, storing, and preserving images and other data. This book explains current data protection and storage technologies in everyday terms. It describes effective procedures for protecting data, from...

4. 

BeagleBone Home Automation

BeagleBone Home Automation

By: Juha Lumme

Publisher: Packt Publishing

Publication Date: 24-DEC-2013

Insert Date: 27-DEC-2013

Slots: 1.0

Table of Contents • Start Reading

Live your sophisticated dream with home automation using BeagleBone Practical approach to home automation using BeagleBone; starting from the very basics of GPIO control and progressing up to building a complete home automation solution Covers the operating principles of a range of useful environment sensors, including their programming and integration to the server application Easy-to-follow approach with electronics schematics, wiring diagrams, and controller code all broken down into manageable and easy-to-understand sections In Detail Home automation lets you control...

5. 

Take Control of iCloud, 2nd Edition

Take Control of iCloud, 2nd Edition

By: 

Publisher: TidBITS Publishing, Inc.

Publication Date: 22-MAY-2014

Insert Date: 24-DEC-2013

Slots: 1.0

Table of Contents • Start Reading

Understand its features and limitations, get set up, and enjoy iCloud!Updated May 22, 2014iCloud is a simple idea--all your data on all your devices, via the cloud--that often becomes complex in real-world situations, such as when you want to share your contacts list, or when you want to open a document stored in iCloud in an app other than the one that created it. In this best-selling title from Joe Kissell, you'll start by learning what iCloud can do, how it differs from other cloud services, and what hardware and software you need to use iCloud successfully on Macs, iOS devices, the Apple...

6. 

Building a Home Security System with BeagleBone

Building a Home Security System with BeagleBone

By: Bill Pretty

Publisher: Packt Publishing

Publication Date: 17-DEC-2013

Insert Date: 22-DEC-2013

Slots: 1.0

Table of Contents • Start Reading

Build your own high-tech alarm system at a fraction of the cost Build your own state-of-the-art security system Monitor your system from anywhere you can receive e-mail Add control of other systems such as sprinklers and gates Save thousands on monitoring and rental fees In Detail One of the best kept secrets of the security industry is just how simple the monitoring hardware actually is - BeagleBone has all the computing power you need to build yourself an extremely sophisticated access control, alarm panel, and home automation and network intrusion-detection...

7. 

Raspberry Pi Super Cluster

Raspberry Pi Super Cluster

By: Andrew K. Dennis

Publisher: Packt Publishing

Publication Date: 20-NOV-2013

Insert Date: 21-NOV-2013

Slots: 1.0

Table of Contents • Start Reading

Build your own parallel computing cluster using Raspberry Pi in the comfort of your own home Learn about parallel computing by building your own system using Raspberry Pi Build a two-node parallel computing cluster Integrate Raspberry Pi with Hadoop to build your own super cluster In Detail A cluster is a type of parallel/distributed processing system which consists of a collection of interconnected stand-alone computers cooperatively working together. Using Raspberry Pi computers, you can build a two-node parallel computing cluster which enhances performance and...

8. 

Home Automation Made Easy: Do It Yourself Know How Using UPB, INSTEON, X10, and Z-Wave

Home Automation Made Easy: Do It Yourself Know How Using UPB, INSTEON, X10, and Z-Wave

By: Dennis C. Brewer

Publisher: Que

Publication Date: 07-NOV-2013

Insert Date: 12-NOV-2013

Slots: 1.0

Table of Contents • Start Reading

Absolutely no experience needed! Make your home smarter, safer, and more fun—and save money, too! Home automation is finally practical, useful, and easy! Now, you can control your home exactly the way you want to, without paying monthly fees. This book shows how to do it all yourself, with today’s simpler, more reliable, less expensive technologies. Dennis C. Brewer first makes sure you’re comfortable with wiring basics and safety, and then guides you through installing, setting up, and using today’s best home automation software. Next, he walks you through several great DIY projects...

9. 

Mobile Security: How to Secure, Privatize, and Recover Your Devices

Mobile Security: How to Secure, Privatize, and Recover Your Devices

By: Tim Speed; Darla Nykamp; Joseph Anderson; Jaya Nampalli; Mari Heiser

Publisher: Packt Publishing

Publication Date: 10-SEP-2013

Insert Date: 15-SEP-2013

Slots: 1.0

Table of Contents • Start Reading

Keep your data secure on the go Learn how mobile devices are monitored and the impact of cloud computing Understand the attacks hackers use and how to prevent them Keep yourself and your loved ones safe online In Detail The threat of hacking may be the most damaging on the internet. Mobile technology is changing the way we live, work, and play, but it can leave your personal information dangerously exposed. Your online safety is at risk and the threat of information being stolen from your device is at an all- time high. Your identity is yours, yet it can be compromised...

10. 

Camera Networks

Camera Networks

By: Amit K. Roy-Chowdhury; Bi Song

Publisher: Morgan & Claypool Publishers

Publication Date: 01-JAN-2012

Insert Date: 10-SEP-2013

Slots: 1.0

Table of Contents • Start Reading

As networks of video cameras are installed in many applications like security and surveillance, environmental monitoring, disaster response, and assisted living facilities, among others, image understanding in camera networks is becoming an important area of research and technology development. There are many challenges that need to be addressed in the process. Some of them are listed below: - Traditional computer vision challenges in tracking and recognition, robustness to pose, illumination, occlusion, clutter, recognition of objects, and activities; - Aggregating local information for...

11. 

The Mac Hacker's Handbook

The Mac Hacker's Handbook

By: 

Publisher: John Wiley & Sons

Publication Date: 03-MAR-2009

Insert Date: 15-AUG-2013

Slots: 1.0

Table of Contents • Start Reading

As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat hackers, this book is aimed at making vital information known so that you can find ways to secure your Mac OS X systems, and examines the sorts of attacks that are prevented by Leopard's security defenses, what attacks aren't, and how to best handle...

12. 

Digital Home Networking

Digital Home Networking

By: 

Publisher: John Wiley & Sons

Publication Date: 31-OCT-2011

Insert Date: 04-JUL-2013

Slots: 1.0

Table of Contents • Start Reading

This much-needed book describes the digital home networking environment, its techniques, and the challenges around its service architecture. It provides a broad introduction to state-of-the-art digital home standards and protocols, as well as in-depth coverage of service architectures for entertainment and domotic services involving digital home resources. Topics include networking, remote access, security, interoperability, scalability, and quality of service. Notably, the book describes the generic architecture that was proposed and developed in the context of the EUREKA/Celtic research...

13. 

iConnected: Use AirPlay, iCloud, Apps, and More to Bring Your Apple Devices Together

iConnected: Use AirPlay, iCloud, Apps, and More to Bring Your Apple Devices Together

By: 

Publisher: John Wiley & Sons

Publication Date: 01-APR-2013

Insert Date: 04-JUL-2013

Slots: 1.0

Table of Contents • Start Reading

Bring your Apple products together and enjoy an orchard of intelligent, unified technology! Whether at work or at home, syncing multiple Apple devices can help you achieve an organized, streamlined, harmonized life. With this unique resource, you discover how to get the most out of AirPlay and iCloud, Apple's streaming and cloud services. Featuring a four-color design and packed with helpful codes, tips, and tricks, this accessible book shows you how to write a document on an iMac at home and then continue editing it on an iPad while on the go without worrying about synching the devices...

14. 

Instant Apple Configurator How-to

Instant Apple Configurator How-to

By: Charles Edge; TJ Houston

Publisher: Packt Publishing

Publication Date: 26-MAR-2013

Insert Date: 01-APR-2013

Slots: 1.0

Table of Contents • Start Reading

Gain full control and complete security when managing mobile iOS devices in mass deployments Learn something new in an Instant! A short, fast, focused guide delivering immediate results. Configure group settings to personalize and secure your devices Deploy multiple profiles Upload and manage mass applications swiftly and easily In Detail The Apple configurator is an incredible piece of software which grants full control in mobile device management, but on a larger scale. The popularity of people taking their own devices to work has grown tremendously. However, valued...

15. 

Take Control of Your Passwords

Take Control of Your Passwords

By: 

Publisher: TidBITS Publishing, Inc.

Publication Date: 24-JAN-2014

Insert Date: 07-MAR-2013

Slots: 1.0

Table of Contents • Start Reading

Overcome password frustration with Joe Kissell's expert advice!Updated May 28, 2013Improve your passwords without losing your cool, thanks to Joe Kissell's expert advice. Start on the path to modern password security by watching Joe's intro video and by checking out our "Joe of Tech" comic.Read the book to understand the problems and apply a real-world strategy that includes choosing a password manager, auditing your existing passwords, and dealing with situations where automated tools can't help.Teach This Book! Once you're satisfied with your own password strategy, you may want to help...

16. 

Wireless Networking Absolute Beginner’s Guide

Wireless Networking Absolute Beginner’s Guide

By: Michael Miller

Publisher: Que

Publication Date: 14-FEB-2013

Insert Date: 09-FEB-2013

Slots: 1.0

Table of Contents • Start Reading

Make the most of your wireless network…without becoming a technical expert! This book is the fastest way to connect all your wireless devices, get great performance with everything from streaming media to printing, stay safe and secure, and do more with Wi-Fi than you ever thought possible! Even if you’ve never set up or run a network before, this book will show you how to do what you want, one incredibly clear and easy step at a time. Wireless networking has never, ever been this simple! Who knew how simple wireless networking could be? This is today’s best beginner’s guide to creating,...

17. 

Préserver son patrimoine numerique

Préserver son patrimoine numerique

By: Claude Huc

Publisher: Eyrolles

Publication Date: 07-JUL-2011

Insert Date: 07-FEB-2013

Slots: 1.0

Table of Contents • Start Reading

Présentation Votre patrimoine numérique est en danger : adoptez les bonnes pratiques et méthodes pour classer tous vos documents et les conserver à moyen ou long terme. Identifiez les périls qui guettent vos fichiers : changements de format et d'encodage, dégradation du support de stockage, virus... Distinguez les documents de travail de ceux à conserver durablement Organisez votre patrimoine numérique avec un arbre de référence Préservez vos courriels à partir d'un webmail ou d'un client de messagerie Choisissez votre stratégie de stockage et les supports appropriés à...

18. 

Security and Privacy for Microsoft® Office 2010 Users

Security and Privacy for Microsoft® Office 2010 Users

By: Mitch Tulloch

Publisher: Microsoft Press

Publication Date: 15-MAR-2012

Insert Date: 14-JAN-2013

Slots: 0.0

Table of Contents • Start Reading

This title is also available as a free eBook. Take control—and put the built-in security and privacy features in Microsoft Office to work! Whether downloading documents, publishing a presentation, or collaborating online—this guide offers concise, how-to guidance and best practices to help protect your documents and your ideas. Get practical, proactive guidance for using the security and privacy management features in Office 2010 and Office 365 Walk through everyday scenarios, and discover everyday techniques that help you take charge Understand common risks and learn best...

19. 

Network Your Computers & Devices Step by Step

Network Your Computers & Devices Step by Step

By: Ciprian Adrian Rusen and 7 Tutorials

Publisher: Microsoft Press

Publication Date: 23-DEC-2010

Insert Date: 14-JAN-2013

Slots: 1.0

Table of Contents • Start Reading

Teach yourself how to use the networking features in Windows 7 to connect your home computers, even if they use different operating systems. With Step by Step, you set the pace -- building and practicing the skills you need, just when you need them! Network your Windows 7-based PCs and set up security Add a Mac or Linux-based computer Share printers, devices, and files with everyone in your home Stream media over your network or to a remote PC Tweak your network and sharing settings Troubleshoot problems and perform easy maintenance Your Step by Step digital content...

20. 

Take Control of Networking & Security in iOS 6

Take Control of Networking & Security in iOS 6

By: 

Publisher: TidBITS Publishing, Inc.

Publication Date: 14-NOV-2012

Insert Date: 28-NOV-2012

Slots: 1.0

Table of Contents • Start Reading

Basic network connections from an iPad, iPhone, or iPod touch can be simple to make, but sometimes you need to go beyond the basics. In this ebook, you'll profit from networking expert Glenn Fleishman's advice on key topics, such as handling hotspot portal pages, creating secure Wi-Fi connections, signing up for the right cellular data plan, setting up your device as a mobile hotspot, conserving cellular data, connecting Bluetooth peripherals, protecting personal data, and using Find My iPhone and other remote tracking software. "I am so very, very delighted with your coverage of the iPad....