O'Reilly Media

Displaying 1-25 of 25 results

  • Webcasts // May 2010

    Hiring the Next-Generation of Cyber Security Professionals in Government

    The need for cyber security professionals is an immediate concern, for all levels of government, and Lewis Shepherd of Microsoft Research, through this webcast tells you the necessity for hiring the Next-Generation of Cyber Security Professionals in Government. One can join in this webcast for free and this 60minutes web...

    Provided By O'Reilly Media

  • Webcasts // Sep 2009

    Information Security and Social Networks

    This webcast is presented by Ben Rothke who is the CISSP QSA is a New York City based senior security consultant with BT Professional Services and has over 15 years of industry experience in information systems security and privacy. The number of social networks is increasing greatly and the threats...

    Provided By O'Reilly Media

  • Webcasts // Aug 2009

    Ground-Zero PowerShell for the SQL Server DBA

    If one is a DBA with no knowledge of PowerShell, then one can watch this wonderful presentation by Sean McCown. Throughout the one hour presentation, the presenter takes one through the methods in which PowerShell can change the way one works with SQL Server forever. This is a new scripting...

    Provided By O'Reilly Media

  • Webcasts // Aug 2009

    Hands-on: Step-by-step MySQL Clustering Setup

    If one is already familiar with the MySQL architecture, and want to enrich the knowledge on cluster architecture, its installation, setup, and also configuration, and management, one can watch this webcast presented by Sean Hull. The presentation is for 60 minutes, and the author takes one through the MySQL's Clustering...

    Provided By O'Reilly Media

  • Webcasts // Jul 2009

    Security Monitoring

    Security threats are increasing day by day, and one needs to find ways for security monitoring, otherwise, one might face with security breach incidences. The presenter, Chris Fry and Martin Nystrom walks the attendee through the security experts from Cisco Systems for about 90 minutes, and this gives much insight...

    Provided By O'Reilly Media

  • Webcasts // Apr 2009

    What's New in Windows Server 2008 R2 Active Directory

    Does one want to learn what is new in windows server 2008 directory? Then the webcast by Brian Desmond and Laura E. Hunter, which is for about ninety minutes is the best one. One can learn for free the exciting and new features in R2 for AD including the AD...

    Provided By O'Reilly Media

  • Webcasts // Feb 2009

    Developing Applications for webOS: A Preview

    If one wants to get a very good glimpse of what Developing Applications for webOS is, then one can check out this webcast presented by Mitch Allen, vice president and software chief technology officer at Palm, Inc. One can develop applications using the palm Mojo Framework, which is the joint...

    Provided By O'Reilly Media

  • Webcasts // Feb 2009

    10 Things Every Software Architect Should Know

    This is really fantastic book; every software architect has to read. This is actually ninety seven Things Every Software Architect Should Know. From this ninety seven the author gave us only ten from extracting more important things. In this truly unique technical book, today's leading software architects present valuable principles...

    Provided By O'Reilly Media

  • Webcasts // Feb 2009

    Designing Web Interfaces: Principles & Patterns for Rich Interaction

    Nowadays every human being consciously or unconsciously connected to the web application. So if one wants to enhance the rich web application interfaced to all human being, one should develop application with Rich interactions to the users. With the recent rise in popularity of web technologies such as Ajax and...

    Provided By O'Reilly Media

  • Webcasts // Jan 2009

    MySQL Replication: Audit, Test, & Verify

    MySQL is the advanced database engine to store data in the database in an effective manner. This is the open source software and cost free software. This is platform independent software. It works in any platform like Microsoft, Linux and etc. it uses basic SQL query language to query into...

    Provided By O'Reilly Media

  • Webcasts // Oct 2008

    When Times Get Tough, the Tough Get Tuning: Improve the Performance of Your Linux Systems

    If one is planning to improve the performance of the linux systems, then check out this webcast presented by Dee-Ann LeBlanc, a course developer for Splunk, an IT search company. She presents this web cast in a very unique way and one can learn, how to break down performance, into...

    Provided By O'Reilly Media

  • Book chapters // Oct 2006

    Master advanced searching to take your SQL query skills to the next level

    If you know the rudiments of the SQL query language but want to take your skills to the next level, learn how to take full advantage of SQL's expressive power: work more with SQL inside the database before pushing data across the network to your applications. Focus on advanced...

    Provided By O'Reilly Media

  • Book chapters // Aug 2006

    Manage computers in Active Directory with these quick and easy recipes

    Learn quick and easy recipes for managing computers with Active Directory in this sample chapter from Active Directory Cookbook, Second Edition, now updated for Windows Server 2003 SP1 and R2 versions. The recipes address common day-to-day tasks: Creating a computer account Creating a computer account for a specific...

    Provided By O'Reilly Media

  • Book chapters // Feb 2006

    Integrate Microsoft Excel and Access with VBA to create sophisticated applications

    There are numerous situations when VBA is not only the preferred way to obtain data, but the only way. This chapter excerpt from Integrating Excel and Access explains when VBA is required and how to incorporate it into Microsoft Excel and Access. Extracting data and moving it between Microsoft...

    Provided By O'Reilly Media

  • Book chapters // Dec 2005

    VoIP Hacks: Build a Standalone Voicemail Server in Less Than a Half-Hour

    Asterisk comprises many quality applications, and voicemail is one of them. In fact, Asterisk is perhaps best known for the feature set of its voicemail system. In this section, the paper demonstrates how one can harness Asterisk's extremely powerful voicemail application in 30 minutes or less. This way, everybody in...

    Provided By O'Reilly Media

  • Book chapters // Oct 2005

    Bypass the BIOS password by hacking your CMOS settings

    Recover from a CMOS memory-affecting virus or work around a boot-time password by making BIOS forget all it once knew. A BIOS password can be very effective at controlling access to your personal computer. If the computer won't boot up until a password is entered it is...

    Provided By O'Reilly Media

  • Book chapters // Jun 2005

    Digital Video Hacks: Cut to the Beat of Your Music

    Digital video is an audiovisual medium, yet the audio portion of the signal tends to be neglected until late in production. If one is attempting to enhance a scene using music, one should choose music that is appropriate to the mood one is trying to create. Even after selecting the...

    Provided By O'Reilly Media

  • Book chapters // Mar 2005

    Tune Windows XP to speed up boot and shutdown times

    A common annoyance for both IT professionals and end users is having to sit and wait while Windows reboots. This sample hack from OReilly's Windows XP Hacks, 2nd Edition shows how to tweak a PC's BIOS, the Windows Registry, and other Windows XP settings to streamline boot and shutdown...

    Provided By O'Reilly Media

  • Book chapters // Feb 2005

    SharePoint User's Guide: Working With Sites and Workspaces

    To understand the power of Windows SharePoint Services, the user must first understand how SharePoint sites organize and access content. A SharePoint site is a web site that creates the base structure for everything the user does with Windows SharePoint Services. SharePoint sites provide the user with the ability to...

    Provided By O'Reilly Media

  • Book chapters // Sep 2004

    iPod & iTunes Hacks: Exercise With Your iPod

    Exercising without music is unthinkable for some people. It might help psych one up to work one's body through those boring miles on the treadmill or the endless reps and sets while weightlifting. Or it might transport one into a meditative state where, in the music's groove, such things as...

    Provided By O'Reilly Media

  • Book chapters // Sep 2004

    iPod & iTunes Hacks: Stream Music With AirPort Express

    AirPort Express is a small, self-contained unit that one plugs into the wall. Its size betrays its power. Using AirPort Express, one can stream music from the computer to anywhere within the house (within 150 feet), share a USB printer, and extend the Apple AirPort network. For iTunes users, Air-Port...

    Provided By O'Reilly Media

  • Book chapters // Sep 2004

    iPod & iTunes Hacks: Convert Text Files Into iPod Books

    Text2iPod X converts the text file into a Contact file that one can place inside the Contacts folder on the iPod. The benefit of this method is that the Contacts feature works on older iPods that do not support the Notes feature of newer iPods. The down side is that...

    Provided By O'Reilly Media

  • Book chapters // Sep 2004

    iPod & iTunes Hacks: Extend Your Visualizer Options

    One might not have discovered it yet, but there is a pretty cool visualizer - an engine for generating interesting patterns based on the pitch and rhythm of the currently playing track - built into iTunes. To see the visualizer do its thing, play a track and go to Visualizer...

    Provided By O'Reilly Media

  • Book chapters // Sep 2004

    iPod & iTunes Hacks: Alter the iTunes Look and Feel by Resource Hacking

    All applications use computer code to describe how they look. With a little work, one can get to the code that makes iTunes looks the way it looks and alter it to one's heart's content. This method isn't as simple as "Skin iTunes with ShapeShifter". However, one's efforts will be...

    Provided By O'Reilly Media

  • Book chapters // Sep 2004

    iPod & iTunes Hacks: Make a New iPod Playlist From Your Selections

    iTunes has a convenient New Playlist From Selection command (available from the File menu) to create a new playlist from a bunch of selected tracks. The only drawback is that it creates the playlist in the current source. This paper lets the reader select some tracks in iTunes and send...

    Provided By O'Reilly Media

  • Book chapters // Aug 2006

    Manage computers in Active Directory with these quick and easy recipes

    Learn quick and easy recipes for managing computers with Active Directory in this sample chapter from Active Directory Cookbook, Second Edition, now updated for Windows Server 2003 SP1 and R2 versions. The recipes address common day-to-day tasks: Creating a computer account Creating a computer account for a specific...

    Provided By O'Reilly Media

  • Book chapters // Oct 2006

    Master advanced searching to take your SQL query skills to the next level

    If you know the rudiments of the SQL query language but want to take your skills to the next level, learn how to take full advantage of SQL's expressive power: work more with SQL inside the database before pushing data across the network to your applications. Focus on advanced...

    Provided By O'Reilly Media

  • Book chapters // Sep 2004

    iPod & iTunes Hacks: Exercise With Your iPod

    Exercising without music is unthinkable for some people. It might help psych one up to work one's body through those boring miles on the treadmill or the endless reps and sets while weightlifting. Or it might transport one into a meditative state where, in the music's groove, such things as...

    Provided By O'Reilly Media

  • Book chapters // Sep 2004

    iPod & iTunes Hacks: Stream Music With AirPort Express

    AirPort Express is a small, self-contained unit that one plugs into the wall. Its size betrays its power. Using AirPort Express, one can stream music from the computer to anywhere within the house (within 150 feet), share a USB printer, and extend the Apple AirPort network. For iTunes users, Air-Port...

    Provided By O'Reilly Media

  • Book chapters // Sep 2004

    iPod & iTunes Hacks: Convert Text Files Into iPod Books

    Text2iPod X converts the text file into a Contact file that one can place inside the Contacts folder on the iPod. The benefit of this method is that the Contacts feature works on older iPods that do not support the Notes feature of newer iPods. The down side is that...

    Provided By O'Reilly Media

  • Book chapters // Sep 2004

    iPod & iTunes Hacks: Extend Your Visualizer Options

    One might not have discovered it yet, but there is a pretty cool visualizer - an engine for generating interesting patterns based on the pitch and rhythm of the currently playing track - built into iTunes. To see the visualizer do its thing, play a track and go to Visualizer...

    Provided By O'Reilly Media

  • Book chapters // Sep 2004

    iPod & iTunes Hacks: Alter the iTunes Look and Feel by Resource Hacking

    All applications use computer code to describe how they look. With a little work, one can get to the code that makes iTunes looks the way it looks and alter it to one's heart's content. This method isn't as simple as "Skin iTunes with ShapeShifter". However, one's efforts will be...

    Provided By O'Reilly Media

  • Book chapters // Sep 2004

    iPod & iTunes Hacks: Make a New iPod Playlist From Your Selections

    iTunes has a convenient New Playlist From Selection command (available from the File menu) to create a new playlist from a bunch of selected tracks. The only drawback is that it creates the playlist in the current source. This paper lets the reader select some tracks in iTunes and send...

    Provided By O'Reilly Media

  • Book chapters // Jun 2005

    Digital Video Hacks: Cut to the Beat of Your Music

    Digital video is an audiovisual medium, yet the audio portion of the signal tends to be neglected until late in production. If one is attempting to enhance a scene using music, one should choose music that is appropriate to the mood one is trying to create. Even after selecting the...

    Provided By O'Reilly Media

  • Book chapters // Feb 2005

    SharePoint User's Guide: Working With Sites and Workspaces

    To understand the power of Windows SharePoint Services, the user must first understand how SharePoint sites organize and access content. A SharePoint site is a web site that creates the base structure for everything the user does with Windows SharePoint Services. SharePoint sites provide the user with the ability to...

    Provided By O'Reilly Media

  • Book chapters // Dec 2005

    VoIP Hacks: Build a Standalone Voicemail Server in Less Than a Half-Hour

    Asterisk comprises many quality applications, and voicemail is one of them. In fact, Asterisk is perhaps best known for the feature set of its voicemail system. In this section, the paper demonstrates how one can harness Asterisk's extremely powerful voicemail application in 30 minutes or less. This way, everybody in...

    Provided By O'Reilly Media

  • Webcasts // Apr 2009

    What's New in Windows Server 2008 R2 Active Directory

    Does one want to learn what is new in windows server 2008 directory? Then the webcast by Brian Desmond and Laura E. Hunter, which is for about ninety minutes is the best one. One can learn for free the exciting and new features in R2 for AD including the AD...

    Provided By O'Reilly Media

  • Webcasts // May 2010

    Hiring the Next-Generation of Cyber Security Professionals in Government

    The need for cyber security professionals is an immediate concern, for all levels of government, and Lewis Shepherd of Microsoft Research, through this webcast tells you the necessity for hiring the Next-Generation of Cyber Security Professionals in Government. One can join in this webcast for free and this 60minutes web...

    Provided By O'Reilly Media

  • Webcasts // Feb 2009

    Developing Applications for webOS: A Preview

    If one wants to get a very good glimpse of what Developing Applications for webOS is, then one can check out this webcast presented by Mitch Allen, vice president and software chief technology officer at Palm, Inc. One can develop applications using the palm Mojo Framework, which is the joint...

    Provided By O'Reilly Media

  • Webcasts // Feb 2009

    10 Things Every Software Architect Should Know

    This is really fantastic book; every software architect has to read. This is actually ninety seven Things Every Software Architect Should Know. From this ninety seven the author gave us only ten from extracting more important things. In this truly unique technical book, today's leading software architects present valuable principles...

    Provided By O'Reilly Media

  • Webcasts // Feb 2009

    Designing Web Interfaces: Principles & Patterns for Rich Interaction

    Nowadays every human being consciously or unconsciously connected to the web application. So if one wants to enhance the rich web application interfaced to all human being, one should develop application with Rich interactions to the users. With the recent rise in popularity of web technologies such as Ajax and...

    Provided By O'Reilly Media

  • Webcasts // Jan 2009

    MySQL Replication: Audit, Test, & Verify

    MySQL is the advanced database engine to store data in the database in an effective manner. This is the open source software and cost free software. This is platform independent software. It works in any platform like Microsoft, Linux and etc. it uses basic SQL query language to query into...

    Provided By O'Reilly Media

  • Webcasts // Oct 2008

    When Times Get Tough, the Tough Get Tuning: Improve the Performance of Your Linux Systems

    If one is planning to improve the performance of the linux systems, then check out this webcast presented by Dee-Ann LeBlanc, a course developer for Splunk, an IT search company. She presents this web cast in a very unique way and one can learn, how to break down performance, into...

    Provided By O'Reilly Media

  • Webcasts // Sep 2009

    Information Security and Social Networks

    This webcast is presented by Ben Rothke who is the CISSP QSA is a New York City based senior security consultant with BT Professional Services and has over 15 years of industry experience in information systems security and privacy. The number of social networks is increasing greatly and the threats...

    Provided By O'Reilly Media

  • Webcasts // Aug 2009

    Ground-Zero PowerShell for the SQL Server DBA

    If one is a DBA with no knowledge of PowerShell, then one can watch this wonderful presentation by Sean McCown. Throughout the one hour presentation, the presenter takes one through the methods in which PowerShell can change the way one works with SQL Server forever. This is a new scripting...

    Provided By O'Reilly Media

  • Webcasts // Aug 2009

    Hands-on: Step-by-step MySQL Clustering Setup

    If one is already familiar with the MySQL architecture, and want to enrich the knowledge on cluster architecture, its installation, setup, and also configuration, and management, one can watch this webcast presented by Sean Hull. The presentation is for 60 minutes, and the author takes one through the MySQL's Clustering...

    Provided By O'Reilly Media

  • Webcasts // Jul 2009

    Security Monitoring

    Security threats are increasing day by day, and one needs to find ways for security monitoring, otherwise, one might face with security breach incidences. The presenter, Chris Fry and Martin Nystrom walks the attendee through the security experts from Cisco Systems for about 90 minutes, and this gives much insight...

    Provided By O'Reilly Media

  • Book chapters // Mar 2005

    Tune Windows XP to speed up boot and shutdown times

    A common annoyance for both IT professionals and end users is having to sit and wait while Windows reboots. This sample hack from OReilly's Windows XP Hacks, 2nd Edition shows how to tweak a PC's BIOS, the Windows Registry, and other Windows XP settings to streamline boot and shutdown...

    Provided By O'Reilly Media

  • Book chapters // Oct 2005

    Bypass the BIOS password by hacking your CMOS settings

    Recover from a CMOS memory-affecting virus or work around a boot-time password by making BIOS forget all it once knew. A BIOS password can be very effective at controlling access to your personal computer. If the computer won't boot up until a password is entered it is...

    Provided By O'Reilly Media

  • Book chapters // Feb 2006

    Integrate Microsoft Excel and Access with VBA to create sophisticated applications

    There are numerous situations when VBA is not only the preferred way to obtain data, but the only way. This chapter excerpt from Integrating Excel and Access explains when VBA is required and how to incorporate it into Microsoft Excel and Access. Extracting data and moving it between Microsoft...

    Provided By O'Reilly Media