Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Home Networking & Security


1. 

Data Protection for Photographers

Data Protection for Photographers

By: 

Publisher: Rocky Nook

Publication Date: 27-FEB-2014

Insert Date: 28-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

All photographers, both amateur and professional, are faced with the important issues of data protection and storage. Without knowledge of the options, tools, and procedures for safe and effective image protection and storage, photographers run the serious risk of losing their image files. This book offers critical information about the best hardware, software, procedures, and practices for capturing, storing, and preserving images and other data. This book explains current data protection and storage technologies in everyday terms. It describes effective procedures for protecting data, from...

2. 

BeagleBone Home Automation

BeagleBone Home Automation

By: Juha Lumme

Publisher: Packt Publishing

Publication Date: 24-DEC-2013

Insert Date: 27-DEC-2013

Slots: 1.0

Table of Contents • Start Reading

Live your sophisticated dream with home automation using BeagleBone Practical approach to home automation using BeagleBone; starting from the very basics of GPIO control and progressing up to building a complete home automation solution Covers the operating principles of a range of useful environment sensors, including their programming and integration to the server application Easy-to-follow approach with electronics schematics, wiring diagrams, and controller code all broken down into manageable and easy-to-understand sections In Detail Home automation lets you control...

3. 

Take Control of iCloud, 2nd Edition

Take Control of iCloud, 2nd Edition

By: 

Publisher: TidBITS Publishing, Inc.

Publication Date: 20-DEC-2013

Insert Date: 24-DEC-2013

Slots: 1.0

Table of Contents • Start Reading

Understand its features and limitations, get set up, and enjoy iCloud! iCloud is a simple idea--all your data on all your devices, via the cloud--that often becomes complex in real-world situations, such as when you want to share your contacts list, or when you want to open a document stored in iCloud in an app other than the one that created it. In this best-selling title from Joe Kissell, you'll start by learning what iCloud can do, how it differs from other cloud services, and what hardware and software you need to use iCloud successfully on Macs, iOS devices, the Apple TV, and...

4. 

Building a Home Security System with BeagleBone

Building a Home Security System with BeagleBone

By: Bill Pretty

Publisher: Packt Publishing

Publication Date: 17-DEC-2013

Insert Date: 22-DEC-2013

Slots: 1.0

Table of Contents • Start Reading

Build your own high-tech alarm system at a fraction of the cost Build your own state-of-the-art security system Monitor your system from anywhere you can receive e-mail Add control of other systems such as sprinklers and gates Save thousands on monitoring and rental fees In Detail One of the best kept secrets of the security industry is just how simple the monitoring hardware actually is - BeagleBone has all the computing power you need to build yourself an extremely sophisticated access control, alarm panel, and home automation and network intrusion-detection...

5. 

Raspberry Pi Super Cluster

Raspberry Pi Super Cluster

By: Andrew K. Dennis

Publisher: Packt Publishing

Publication Date: 20-NOV-2013

Insert Date: 21-NOV-2013

Slots: 1.0

Table of Contents • Start Reading

Build your own parallel computing cluster using Raspberry Pi in the comfort of your own home Learn about parallel computing by building your own system using Raspberry Pi Build a two-node parallel computing cluster Integrate Raspberry Pi with Hadoop to build your own super cluster In Detail A cluster is a type of parallel/distributed processing system which consists of a collection of interconnected stand-alone computers cooperatively working together. Using Raspberry Pi computers, you can build a two-node parallel computing cluster which enhances performance and...

6. 

Home Automation Made Easy: Do It Yourself Know How Using UPB, INSTEON, X10, and Z-Wave

Home Automation Made Easy: Do It Yourself Know How Using UPB, INSTEON, X10, and Z-Wave

By: Dennis C. Brewer

Publisher: Que

Publication Date: 07-NOV-2013

Insert Date: 12-NOV-2013

Slots: 1.0

Table of Contents • Start Reading

Absolutely no experience needed! Make your home smarter, safer, and more fun—and save money, too! Home automation is finally practical, useful, and easy! Now, you can control your home exactly the way you want to, without paying monthly fees. This book shows how to do it all yourself, with today’s simpler, more reliable, less expensive technologies. Dennis C. Brewer first makes sure you’re comfortable with wiring basics and safety, and then guides you through installing, setting up, and using today’s best home automation software. Next, he walks you through several great DIY projects...

7. 

Mobile Security: How to Secure, Privatize, and Recover Your Devices

Mobile Security: How to Secure, Privatize, and Recover Your Devices

By: Tim Speed; Darla Nykamp; Joseph Anderson; Jaya Nampalli; Mari Heiser

Publisher: Packt Publishing

Publication Date: 10-SEP-2013

Insert Date: 15-SEP-2013

Slots: 1.0

Table of Contents • Start Reading

Keep your data secure on the go Learn how mobile devices are monitored and the impact of cloud computing Understand the attacks hackers use and how to prevent them Keep yourself and your loved ones safe online In Detail The threat of hacking may be the most damaging on the internet. Mobile technology is changing the way we live, work, and play, but it can leave your personal information dangerously exposed. Your online safety is at risk and the threat of information being stolen from your device is at an all- time high. Your identity is yours, yet it can be compromised...

8. 

Camera Networks

Camera Networks

By: Amit K. Roy-Chowdhury; Bi Song

Publisher: Morgan & Claypool Publishers

Publication Date: 01-JAN-2012

Insert Date: 10-SEP-2013

Slots: 1.0

Table of Contents • Start Reading

As networks of video cameras are installed in many applications like security and surveillance, environmental monitoring, disaster response, and assisted living facilities, among others, image understanding in camera networks is becoming an important area of research and technology development. There are many challenges that need to be addressed in the process. Some of them are listed below: - Traditional computer vision challenges in tracking and recognition, robustness to pose, illumination, occlusion, clutter, recognition of objects, and activities; - Aggregating local information for...

9. 

The Mac Hacker's Handbook

The Mac Hacker's Handbook

By: 

Publisher: John Wiley & Sons

Publication Date: 03-MAR-2009

Insert Date: 15-AUG-2013

Slots: 1.0

Table of Contents • Start Reading

As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat hackers, this book is aimed at making vital information known so that you can find ways to secure your Mac OS X systems, and examines the sorts of attacks that are prevented by Leopard's security defenses, what attacks aren't, and how to best handle...

10. 

Digital Home Networking

Digital Home Networking

By: 

Publisher: John Wiley & Sons

Publication Date: 31-OCT-2011

Insert Date: 04-JUL-2013

Slots: 1.0

Table of Contents • Start Reading

This much-needed book describes the digital home networking environment, its techniques, and the challenges around its service architecture. It provides a broad introduction to state-of-the-art digital home standards and protocols, as well as in-depth coverage of service architectures for entertainment and domotic services involving digital home resources. Topics include networking, remote access, security, interoperability, scalability, and quality of service. Notably, the book describes the generic architecture that was proposed and developed in the context of the EUREKA/Celtic research...

11. 

iConnected: Use AirPlay, iCloud, Apps, and More to Bring Your Apple Devices Together

iConnected: Use AirPlay, iCloud, Apps, and More to Bring Your Apple Devices Together

By: 

Publisher: John Wiley & Sons

Publication Date: 01-APR-2013

Insert Date: 04-JUL-2013

Slots: 1.0

Table of Contents • Start Reading

Bring your Apple products together and enjoy an orchard of intelligent, unified technology! Whether at work or at home, syncing multiple Apple devices can help you achieve an organized, streamlined, harmonized life. With this unique resource, you discover how to get the most out of AirPlay and iCloud, Apple's streaming and cloud services. Featuring a four-color design and packed with helpful codes, tips, and tricks, this accessible book shows you how to write a document on an iMac at home and then continue editing it on an iPad while on the go without worrying about synching the devices...

12. 

Instant Apple Configurator How-to

ShortCut

Instant Apple Configurator How-to

By: Charles Edge; TJ Houston

Publisher: Packt Publishing

Publication Date: 26-MAR-2013

Insert Date: 01-APR-2013

Slots: 1.0

Table of Contents • Start Reading

Gain full control and complete security when managing mobile iOS devices in mass deployments Learn something new in an Instant! A short, fast, focused guide delivering immediate results. Configure group settings to personalize and secure your devices Deploy multiple profiles Upload and manage mass applications swiftly and easily In Detail The Apple configurator is an incredible piece of software which grants full control in mobile device management, but on a larger scale. The popularity of people taking their own devices to work has grown tremendously. However, valued...

13. 

Take Control of Your Passwords

Take Control of Your Passwords

By: 

Publisher: TidBITS Publishing, Inc.

Publication Date: 24-JAN-2014

Insert Date: 07-MAR-2013

Slots: 1.0

Table of Contents • Start Reading

Overcome password frustration with Joe Kissell's expert advice!Updated May 28, 2013Improve your passwords without losing your cool, thanks to Joe Kissell's expert advice. Start on the path to modern password security by watching Joe's intro video and by checking out our "Joe of Tech" comic.Read the book to understand the problems and apply a real-world strategy that includes choosing a password manager, auditing your existing passwords, and dealing with situations where automated tools can't help.Teach This Book! Once you're satisfied with your own password strategy, you may want to help...

14. 

Wireless Networking Absolute Beginner’s Guide

Wireless Networking Absolute Beginner’s Guide

By: Michael Miller

Publisher: Que

Publication Date: 14-FEB-2013

Insert Date: 09-FEB-2013

Slots: 1.0

Table of Contents • Start Reading

Make the most of your wireless network…without becoming a technical expert! This book is the fastest way to connect all your wireless devices, get great performance with everything from streaming media to printing, stay safe and secure, and do more with Wi-Fi than you ever thought possible! Even if you’ve never set up or run a network before, this book will show you how to do what you want, one incredibly clear and easy step at a time. Wireless networking has never, ever been this simple! Who knew how simple wireless networking could be? This is today’s best beginner’s guide to creating,...

15. 

Préserver son patrimoine numerique

Préserver son patrimoine numerique

By: Claude Huc

Publisher: Eyrolles

Publication Date: 07-JUL-2011

Insert Date: 07-FEB-2013

Slots: 1.0

Table of Contents • Start Reading

Présentation Votre patrimoine numérique est en danger : adoptez les bonnes pratiques et méthodes pour classer tous vos documents et les conserver à moyen ou long terme. Identifiez les périls qui guettent vos fichiers : changements de format et d'encodage, dégradation du support de stockage, virus... Distinguez les documents de travail de ceux à conserver durablement Organisez votre patrimoine numérique avec un arbre de référence Préservez vos courriels à partir d'un webmail ou d'un client de messagerie Choisissez votre stratégie de stockage et les supports appropriés à...

16. 

Security and Privacy for Microsoft® Office 2010 Users

Security and Privacy for Microsoft® Office 2010 Users

By: 

Publisher: Microsoft Press

Publication Date: 09-MAR-2012

Insert Date: 14-JAN-2013

Slots: 1.0

Table of Contents • Start Reading

This title is also available as a free eBook on the Microsoft Download Center (microsoft.com/download) and at O’Reilly Media (oreilly.com). Whether downloading documents, publishing a presentation, or collaborating online—help protect your work and your ideas with this concise guide to Office 2010 security and privacy features....

17. 

Network Your Computers & Devices Step by Step

Network Your Computers & Devices Step by Step

By: ;

Publisher: Microsoft Press

Publication Date: 04-JAN-2011

Insert Date: 14-JAN-2013

Slots: 1.0

Table of Contents • Start Reading

The smart way to learn how to use the built-in networking features of Windows -- one step at a time! Work at your own pace through easy-to-follow lessons, and learn exactly what you need so you can do more and get more from your networked home!...

18. 

Take Control of Networking & Security in iOS 6

Take Control of Networking & Security in iOS 6

By: 

Publisher: TidBITS Publishing, Inc.

Publication Date: 14-NOV-2012

Insert Date: 28-NOV-2012

Slots: 1.0

Table of Contents • Start Reading

Basic network connections from an iPad, iPhone, or iPod touch can be simple to make, but sometimes you need to go beyond the basics. In this ebook, you'll profit from networking expert Glenn Fleishman's advice on key topics, such as handling hotspot portal pages, creating secure Wi-Fi connections, signing up for the right cellular data plan, setting up your device as a mobile hotspot, conserving cellular data, connecting Bluetooth peripherals, protecting personal data, and using Find My iPhone and other remote tracking software. "I am so very, very delighted with your coverage of the iPad....

19. 

Perfect Password

Perfect Password

By: Mark Burnett

Publisher: Syngress

Publication Date: 11-DEC-2005

Insert Date: 08-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals. Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate...

20. 

Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives

Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives

By: Eric Cole; Michael Nordfelt; Sandra Ring; Ted Fair

Publisher: Syngress

Publication Date: 12-APR-2005

Insert Date: 06-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel...