首页
社区
课程
招聘
[转帖]Компьютерная литература на английском языке
发表于: 2012-10-11 22:44 5717

[转帖]Компьютерная литература на английском языке

2012-10-11 22:44
5717
收藏
免费 1
支持
分享
最新回复 (133)
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
51
http://www.idabook.com/index.html
上传的附件:
2012-12-31 04:40
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
52

SQL Injection Attacks and Defense
Publisher: S y n g r e s s 2009 | 474 Pages | ISBN: 1597494240 | PDF | 7 MB

Winner of the Best Book Bejtlich Read in 2009 award!
SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information to turn to for help. This is the only book devoted exclusively to this long-established but recently growing threat. It includes all the currently known information about these attacks and significant insight from its contributing team of SQL injection experts.
http://ul.to/3tlc0674

上传的附件:
2013-1-1 05:31
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
53

No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
Publisher: Syn-g-s 2008 | 384 Pages | ISBN: 1597492159 | PDF | 22 MB

As the cliché reminds us, information is power. In this age of computer systems and technology, an increasing majority of the world's information is stored electronically. It makes sense then that as an industry we rely on high-tech electronic protection systems to guard that information. As a professional hacker, I get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, my goal has always been the same: extract the informational secrets using any means necessary. After hundreds of jobs, I discovered the secret to bypassing every conceivable high-tech security system.
http://ul.to/l4161q3w

上传的附件:
2013-1-1 07:20
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
54

Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
by Paco Hope, Ben Walther
English | 2008 | ISBN: 0596514832 | 314 pages | PDF | 6.45 MB
Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad hoc security assessments, these recipes are repeatable, concise, and systematic-perfect for integrating into your regular test suite.

Recipes cover the basics from observing messages between clients and servers to multi-phase tests that script the login and execution of web application features. By the end of the book, you'll be able to build tests pinpointed at Ajax functions, as well as large multi-step tests for the usual suspects: cross-site scripting and injection attacks. This book helps you:
- Obtain, install, and configure useful-and free-security testing tools
- Understand how your application communicates with users, so you can better simulate attacks in your tests
- Choose from many different methods that simulate common attacks such as SQL injection, cross-site scripting, and manipulating hidden form fields
- Make your tests repeatable by using the scripts and examples in the recipes as starting points for automated tests

Don't live in dread of the midnight phone call telling you that your site has been hacked. With Web Security Testing Cookbook and the free tools used in the book's examples, you can incorporate security coverage into your test suite, and sleep in peace.
http://ul.to/9tcuddtx

上传的附件:
2013-1-1 07:21
0
雪    币: 12
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
55
楼主大爱,顶起
2013-1-1 07:22
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
56

Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
by Roger R. Dube
English | 2008 | ISBN: 0470193395 | 256 pages | PDF | 12.7 MB
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security technologies. It is an invaluable source for computer engineers, computer security specialists, electrical engineers, software engineers, IT professionals, and advanced undergraduate and graduate students in computer engineering and computer science.
http://ul.to/oojoodak

上传的附件:
2013-1-1 07:23
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
57

Digital Forensics for Network, Internet, and Cloud Computing
Publisher: Syngress 2010 | 368 Pages | ISBN: 1597495379 | PDF | 13 MB

Network forensics is an evolution of typical digital forensics, where evidence is gathered and analyzed from network traffic. This book will help security and network forensics professionals, as well as network administrators, understand the challenges faced by organizations and individuals investigating network-based criminal cases. The authors not only present various tools used to examine network traffic but also introduce different investigative methodologies. With the explosive growth in Internet-based technology (e.g., social networks, cloud computing, telecommuting), computer and network forensics investigators are among the fastest areas of growth. Specifically, in the area of cybercrime and digital forensics, the federal government is conducting a talent search for 10K qualified specialists.
http://ul.to/ws6x8hgw

上传的附件:
2013-1-1 07:24
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
58

ibor Jager - Black-Box Models of Computation in Cryptology
Published: 2012-03-23 | ISBN: 3834819891 | PDF | 98 pages | 3 MB

Generic group algorithms solve computational problems defined over algebraic groups without exploiting properties of a particular representation of group elements. This is modeled by treating the group as a black-box. The fact that a computational problem cannot be solved by a reasonably restricted class of algorithms may be seen as support towards the conjecture that the problem is also hard in the classical Turing machine model. Moreover, a lower complexity bound for certain algorithms is a helpful insight for the search for cryptanalytic algorithms. Tibor Jager addresses several fundamental questions concerning algebraic black-box models of computation: Are the generic group model and its variants a reasonable abstraction? What are the limitations of these models? Can we relax these models to bring them closer to the reality?
http://ul.to/uaushw83

上传的附件:
2013-1-2 05:04
0
雪    币: 389
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
59
刘明会火,支持
2013-1-2 09:34
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
60

Ken Bluttman, "Access Hacks: Tips & Tools for Wrangling Your Data"
English | 2005-04-24 | ISBN: 0596009240 | 352 pages | EPUB | 19 mb

As part of the Microsoft Office suite, Access has become the industry's leading desktop database management program for organizing, accessing, and sharing information. But taking advantage of this product to build increasingly complex Access applications requires something more than your typical how-to book.

This valuable guide provides direct, hands-on solutions that can help relieve the frustrations felt by users struggling to master the program's various complexities. For experienced users, Access Hacks offers a unique collection of proven techniques and tools that enable them to take their database skills and productivity to the next level. For Access beginners, it helps them acquire a firm grasp of the program's most productive features.

A smart collection of insider tips and tricks, Access Hacks covers all of the program's finer points. Among the multitude of topics addressed, it shows users how to:

- work with Access in multi-user environments
- utilize SQL queries
- work with external data and programs
- integrate Access with third-party products

Just imagine: a learning process without the angst. Well, Access Hacks delivers it with ease, thanks to these down-and-dirty techniques not collected together anywhere else.

Access Hacks is based on author Ken Bluttman's two decades of real-world experience in database programming and business application building. It's because of his vast experiences that the book is able to offer such a deep understanding of the program's expanding possibilities.
http://ul.to/i5nsizu0

上传的附件:
2013-1-4 04:42
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
61

Dissecting the Hack: The F0rb1dd3n Network
Publisher: Syngress 2009 | 448 Pages | ISBN: 159749478X | PDF | 15 MB

Dissecting the Hack is one heck of a ride! Hackers, IT professionals, and Infosec aficionados will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One half massive case study, one half technical manual, Dissecting the Hack has it all - learn all about hacking tools and techniques and how to defend your network against threats.

Yes, the security threats are real - read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit and expunge with the tools and techniques shown in the story. Every hack is real and can be used by you once you have the knowledge within this book!

Utilizes actual hacking and security tools in its story- helps to familiarize a newbie with the many devices and their code

Introduces basic hacking techniques in real life context for ease of learning

Presented in the words of the hacker/security pro, effortlessly envelops the beginner in the language of the hack
http://ul.to/96o3q62p

上传的附件:
2013-1-6 04:17
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
62

Seven Deadliest USB Attacks (Seven Deadliest Attacks) by Brian Anderson and Barbara Anderson
Publisher: Syngress; 1 edition (May 6, 2010) | ISBN: 1597495530 | English | PDF | 256 pages | 8 MB

Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

Attacks detailed in this book include:

1. USB Hacksaw
2. USB Switchblade
3. USB Based Virus/Malicous Code Launch
4. USB Device Overflow
5. RAMdump
6. Pod Slurping
7. Social Engineering and USB Technology

- Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally
- Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how
- Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable

Brian Anderson started his security career as a USMC Military Police officer. During his tour in the USMC Brian also served as an instructor for weapons marksmanship, urban combat, building entry techniques and less than lethal munitions. He also took part in the Somalia humanitarian efforts and several training engagements in the Middle East.

Brian's technical experience began when he joined EDS where he became part of a leveraged team and specialized in infrastructure problem resolution, disaster recovery and design and security. His career progression was swift carrying him through security engineering and into architecture where he earned a lead role. Brian was a key participant in many high level security projects driven by HIPAA, PCI, SOX, FIPS and other regulatory compliance which included infrastructure dependent services, multi-tenant directories, IdM, RBAC, SSO, WLAN, full disk and removable media encryption, leveraged perimeter design and strategy. He has earned multiple certifications for client, server and network technologies. Brian has written numerous viewpoint and whitepapers for current and emerging technologies and is a sought out expert on matters of security, privacy and penetration testing. Brian is an avid security researcher with expertise in reverse engineering focusing on vulnerabilities and exploits and advising clients on proper remediation.

Barbara Anderson has worked in the information technology industry as a network and server security professional for over eleven years. During that time, she has been acting as a senior network security engineer who provides consulting and support for all aspects of network and security design. Barbara comes from a strong network security background and has extensive experience in enterprise design, implementation and life-cycle management.

Barbara proudly served her country for over four years in the United States Air force and has enjoyed successful positions at EDS, SMU, Fujitsu, ACS and Fishnet Security. These experiences and interactions have allowed her to become an expert in enterprise security, product deployment and training.
http://uploaded.net/file/pnaxcquz/1597495530.pdf

上传的附件:
2013-1-6 04:19
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
63

Marc Joye, Michael Tunstall - Fault Analysis in Cryptography
Published: 2012-06-21 | ISBN: 3642296556 | PDF | 370 pages | 3 MB

In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic devices designed for harsh environments. Ultimately various mechanisms for fault creation and propagation were discovered, and in particular it was noted that many cryptographic algorithms succumb to so-called fault attacks. Preventing fault attacks without sacrificing performance is nontrivial and this is the subject of this book. Part I deals with side-channel analysis and its relevance to fault attacks. The chapters in Part II cover fault analysis in secret key cryptography, with chapters on block ciphers, fault analysis of DES and AES, countermeasures for symmetric-key ciphers, and countermeasures against attacks on AES. Part III deals with fault analysis in public key cryptography, with chapters dedicated to classical RSA and RSA-CRT implementations, elliptic curve cryptosystems and countermeasures using fault detection, devices resilient to fault injection attacks, lattice-based fault attacks on signatures, and fault attacks on pairing-based cryptography. Part IV examines fault attacks on stream ciphers and how faults interact with countermeasures used to prevent power analysis attacks. Finally, Part V contains chapters that explain how fault attacks are implemented, with chapters on fault injection technologies for microprocessors, and fault injection and key retrieval experiments on a widely used evaluation board. This is the first book on this topic and will be of interest to researchers and practitioners engaged with cryptographic engineering.
http://ul.to/sxb0kkyf

上传的附件:
2013-1-7 04:59
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
64

Secure Programming Cookbook for C and C++
2003 | ISBN-10: 0596003943 | PDF | 336 pages | 4 MB

Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at risk. Clearly, today's developers need help figuring out how to write code that attackers won't be able to exploit. But writing such code is surprisingly difficult.

Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code. It contains a wealth of solutions to problems faced by those who care about the security of their applications. It covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering. The rich set of code samples provided in the book's more than 200 recipes will help programmers secure the C and C++ programs they write for both Unix® (including Linux®) and Windows® environments.
http://ul.to/k40g29ev

上传的附件:
2013-1-7 05:00
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
65
Hackers: Heroes of the Computer Revolution (25th Anniversary Edition)
Publisher: O'Reilly Media 2010 | 528 Pages | ISBN: 1449388396 | PDF | 12 MB
http://rghost.net/42793834


_http://forum.exetools.com/showpost.php?p=82158&postcount=590
2013-1-7 10:34
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
66

Christopher Hadnagy, Paul Wilson, "Social Engineering: The Art of Human Hacking"
English | 2010-12-21 | ISBN: 0470639539 | 408 pages | EPUB + MOBI | 6 mb + 6 mb

The first book to reveal and dissect the technical aspect of many social engineering maneuvers.

From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering.

Kevin Mitnick—one of the most famous social engineers in the world—popularized the term “social engineering.” He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats.

- Examines social engineering, the science of influencing a target to perform a desired task or divulge information;
- Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access;
- Reveals vital steps for preventing social engineering threats.

Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers—now you can do your part by putting to good use the critical information within its pages.
http://ul.to/2nboz1ou
http://ul.to/6lunlw54

上传的附件:
2013-1-14 09:42
0
雪    币: 37
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
67
这是好东西啊,谢谢楼主分享,大爱,关注+感谢+下载
2013-1-14 11:04
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
68

Security and privacy in social networks
Publisher: Springer | ISBN: 1461441382 | 2013 | PDF | 259 pages | 5,37 Mb

Security and Privacy in Social Networks brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks, and is the first comprehensive attempt dedicated entirely to this field. In order to facilitate the transition of such methods from theory to mechanisms designed and deployed in existing online social networking services, the book aspires to create a common language between the researchers and practitioners of this new area — spanning from the theory of computational social sciences to conventional security and network engineering.

Presents innovative solutions to social network security challenges
Defines a new field of research in computer and communications security
Raises emerging security problems in online social network environments
http://rghost.net/42936887

上传的附件:
  • 1.png (130.62kb,1次下载)
2013-1-17 13:08
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
69

Greg Shackles, "Mobile Development with C#: Building Native iOS, Android, and Windows Phone Applications"
English | 2012 | ISBN: 1449320236 | Epub | 174 Pages | 5 MB

It's true: you can build native apps for iOS, Android, and Windows Phone with C# and the .NET Framework--with help from MonoTouch and Mono for Android. This hands-on guide shows you how to reuse one codebase across all three platforms by combining the business logic layer of your C# app with separate, fully native UIs. It's an ideal marriage of platform-specific development and the "write once, run everywhere" philosophy
Download From Uploaded.net:
http://uploaded.net/file/xih9q7rg/1449320236-Epub_avaxhome.ws.rar


Download From Bitshare.com:
http://bitshare.com/files/hty6bjpa/1449320236-Epub_avaxhome.ws.rar.html

上传的附件:
2013-1-17 13:12
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
70

Neal Goldstein, "iPad Application Development For Dummies"
English | ISBN: 1118213920 | edition 2012 | PDF | 576 pages | 60,9 MB

The fun and easy guide to creating iPad apps, updated for iOS 5!

iPad app development is hot, with more than 140,000 apps available specifically for the device and that number growing every day. The introduction of iOS 5 and iCloud gives developers even more options to create incredible iPad apps. This fast and friendly guide to iPad app development is fully updated for the most recent upgrades and covers everything you need to know, starting with how to download the SDK and become an Apple developer all the way to finishing up your app and submitting it to the App Store.

Zeroes in on essential concepts and tools including storyboard, segues, the ARC memory manager, what makes a great iPad app, and more
Explains how the iPad offers development opportunities that go beyond the capabilities of the iPhone or iPod touch by focusing exclusively on developing apps for the iPad
Looks at how iOS 5 and iCloud brought many changes to the device and a wealth of new features for app developers to utilize in their apps
Covers how to become a registered Apple developer, how to download and set up the SDK, and the details of how an iPad app runs
Popular developer Neal Goldstein examines what goes into a great user experience and takes you step by step through the actual development of two apps, illustrating everything you need to know
Whether you're looking for a new hobby or you want to build a business in app development, iPad Application Development For Dummies, 3rd Edition is the book you'll want in your developer's toolkit!
http://uploaded.net/file/kosyi92n/1118213920.pdf

上传的附件:
2013-1-17 13:14
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
71

Stephen Prata, "C Primer Plus, 5th Edition"
English | 2004 | ISBN: 0672326965 | 984 pages | PDF | 3,6 MB

The new classic! C Primer Plus , now in its 5th edition, has been revised to include over 20 new programming exercises, newly improved examples and the new ANSI/ISO standard, C99. Task-oriented examples will teach you the fundamentals of C programming. From extended integer types and compound literals to Boolean support and variable-length arrays, you will learn to create practical and real-world applications with C programming. Review questions and programming exercises at the end of each chapter will reinforce what you have learned. This friendly and easy-to-use self-study guide will help you understand the fundamentals of this core programming language.
http://uploaded.net/file/cfqs1ddk/0672326965.pdf

上传的附件:
2013-1-17 13:15
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
72

Guojun Gan, "Data Clustering in C++: An Object-Oriented Approach"
2011 | ISBN: 1439862230 | PDF | 520 pages | 3,9 MB

Data clustering is a highly interdisciplinary field, the goal of which is to divide a set of objects into homogeneous groups such that objects in the same group are similar and objects in different groups are quite distinct. Thousands of theoretical papers and a number of books on data clustering have been published over the past 50 years. However, few books exist to teach people how to implement data clustering algorithms. This book was written for anyone who wants to implement or improve their data clustering algorithms.
Using object-oriented design and programming techniques, Data Clustering in C++ exploits the commonalities of all data clustering algorithms to create a flexible set of reusable classes that simplifies the implementation of any data clustering algorithm. Readers can follow the development of the base data clustering classes and several popular data clustering algorithms. Additional topics such as data pre-processing, data visualization, cluster visualization, and cluster interpretation are briefly covered.

This book is divided into three parts
Data Clustering and C++ Preliminaries: A review of basic concepts of data clustering, the unified modeling language, object-oriented programming in C++, and design patterns
A C++ Data Clustering Framework: The development of data clustering base classes
Data Clustering Algorithms: The implementation of several popular data clustering algorithms

A key to learning a clustering algorithm is to implement and experiment the clustering algorithm. The only requirements to compile the code are a modern C++ compiler and the Boost C++ libraries.
http://ul.to/dkaejj5t

上传的附件:
2013-1-17 13:16
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
73

Programming Microsoft SQL Server 2012
2012 | 816 Pages | ISBN: 0735658226 | PDF | 14 MB

Your essential guide to key programming features in Microsoft® SQL Server® 2012
Take your database programming skills to a new level—and build customized applications using the developer tools introduced with SQL Server 2012. This hands-on reference shows you how to design, test, and deploy SQL Server databases through tutorials, practical examples, and code samples. If you’re an experienced SQL Server developer, this book is a must-read for learning how to design and build effective SQL Server 2012 applications.
http://ul.to/76bj6w8a

上传的附件:
2013-1-17 13:17
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
74

iPad App Directory Volume 5
Publisher:Imagine Publishing Ltd | ISBN:1908955554 | English | 178 Pages | True PDF | 25MB

The iPad 2 and new iPad are undoubtedly phenomenal devices, but they get even better when you factor in the life-enhancing apps that run on them. Apple’s App Store is now home to well over 650,000 apps, and in March 2012 Apple celebrated its 25 billionth app downloaded, which shows just how important these apps are to iPad owners across the world. Naturally, they’re not all winners, which is why we’ve done most of the hard work and provided guidance on the ones that might appeal to you – as well as the ones you’ll want to avoid. From games and books to pass the time away to health and medical apps that could actually save your life, the iPad App Directory Volume 5 shows you the latest and greatest apps for your iPad 2 and new iPad.
http://filepost.com/files/49d273dc/iPadAppDirectory.pdf/

上传的附件:
2013-1-17 16:37
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
75

Mac Tips, Tricks, Apps & Hacks
Publisher:Imagine Publishing Ltd | ISBN:1908955627 | English | 226 Pages | True PDF | 74MB

Your Mac is an incredible piece of kit, that offers features to suit anyone and everyone. Designed to be accessible, intelligent and reliable, it’s simple to just turn your machine on and get straight in to everything it has to offer. However, there’s so much more to these machines than first meets the eye. Dig a little deeper and you’ll open a whole new world of possibilities. That’s where this book comes in. Packed with in-depth features and step-by-step tutorials, you’ll learn how to hone your Mac skills, and improve the way your machine works. Whether your Mac’s a little sluggish and want to speed things up, or you want to add that personal touch to your desktop, we’ll show you how. With guides covering iPhoto, iMovie, GarageBand, Pages, Aperture, Final Cut Pro X and more, we’ll also show you how to improve your productivity and create amazing projects on your Mac. On top of that, you can discover how to tweak the inner workings of your machine, including how to add an extra hard drive to your MacBook. Last but not least, we point you in the direction of the best the Mac App Store has to offer, opening up a world of new possibilities.
http://filepost.com/files/6767e16a/MacTipsTricksAppsHacks.pdf/

上传的附件:
2013-1-17 16:39
0
游客
登录 | 注册 方可回帖
返回
//