Posts Tagged ‘Buku Komputer’

Barbara Obermeier , “Photoshop CS4 All-in-One For Dummies”
For Dummies | 2008 | ISBN: 047032726X | 720 pages | PDF | 30 MB

Your one-stop Photoshop reference, filled with the latest tips and techniques

There’s a reason why Photoshop is the industry standard for image-editing software. But it’s also that big, Photoshop has so many facets and features that a handy one-stop guide is exactly what you need. And you’ll love the “Putting It Together” exercises that give you hands-on experience – in rich, full color!
Learn the parts — the desktop, menus, panels, and key tools, and how to use Adobe Bridge
Make your selection — learn about each of the selection tools plus the powerful Pen tool and Paths panel
Brush up — on the Brush and Pencil tools and how to create vector shapes, create and edit type, and put type on a path
Restore and retouch — correct and enhance color, improve contrast, and use the Clone Stamp and Healing tools to fix flaws and damage
Print it — learn how to get the right resolution, image mode, and file format, and prepare your work for printing

Open the book and find:
How to crop images and increase their canvas size
Tips for creating gradients and patterns
Advice on resizing images
How to composite images with layers and blending modes
Filter techniques to correct or alter images
How the Vanishing Point feature makes editing easier
Steps for making adjustments with levels and curves
How to create contact sheets


Read Full Post »

John Q. Walker, Jeffrey T. Hicks, “Taking Charge of Your VoIP Project ”
Cisco Press | 2004 | ISBN: 1587200929 | 312 pages | CHM | 1,8 MB

Taking Charge of Your VoIP Project
by John Q. Walker, Jeffrey T. Hicks
Strategies and solutions for successful VoIP deployments
Network Business Series
Justify your network investment
The step-by-step approach to VoIP deployment and management enables you to plan early and properly for successful VoIP integration with your existing systems, networks, and applications.
The detailed introduction offers a common grounding for members of both the telephony and data networking communities.
IT managers and project leaders are armed with details on building a business case for VoIP, including details of return-on-investment (ROI) analysis and justification.
A VoIP deployment is presented as a major IT project, enabling you to understand the steps involved and the required resources.
The comprehensive look at quality of service and tuning describes when and where to use them in a VoIP deployment. These are often the most complex topics in VoIP; you’ll get smart recommendations on which techniques to use in various circumstances.
You learn how to plan for VoIP security, including prevention, detection, and reaction.
Voice over IP (VoIP) is the telephone system of the future. Problem is, VoIP is not yet widely deployed, so there are few skilled practitioners today. As you make your move to VoIP, how will you know how to make VoIP work and keep it working well? What changes will you need to make without disrupting your business? How can you show your return on this investment?
Many books contain technical details about VoIP, but few explain in plain language how to make it run successfully in an enterprise. Taking Charge of Your VoIP Project provides the detailed plans you need to be successful in your organization’s deployment of VoIP. Through their years of work in the field, authors John Q. Walker and Jeffrey T. Hicks bring a project-oriented approach to VoIP, with much-needed clarity on getting VoIP to work well.
Taking Charge of Your VoIP Project starts with simple concepts, each chapter building on the knowledge from the last. Although not a technical manual, you learn about the standards, such as H.323, G.711, and Real-Time Transport Protocol (RTP), and the implications they have on your VoIP system. Most importantly, you’ll gain expert advice and a systematic guide on how to make VoIP work for your organization.
This volume is in the Network Business Series offered by Cisco Press. Books in this series provide IT executives, decision makers, and networking professionals with pertinent information on today’s most important technologies and business strategies.

Read Full Post »

Aaron E. Earle, “Wireless Security Handbook”
Auerbach Publications | 2005 | ISBN: 0849333784 | 384 pages | PDF | 12,6 MB

The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives, including those of an auditor, security architect, and hacker. This wide scope benefits anyone who has to administer, secure, hack, or conduct business on a wireless network. This text tackles wireless risk from many angles. It discusses the mitigation of wireless risk at the policy level, cost-effective ways of deploying wireless across large enterprises, and financial controls that reduce unforeseen risks in wireless projects. The handbook also offers the technical details of how you can design, build, and hack nearly all wireless security components. This volume also helps advance your career by covering all of the objectives of the three widely recognized wireless certifications–those administered by Planet3 Wireless and Cisco Systems. The book focuses on the wireless local area networking technologies that help you meet these objectives, while also analyzing almost all other facets of mobile communications.

Read Full Post »

Michael O’Dea, “Repost: HackNotes Windows Security Portable Reference”
McGraw-Hill Osborne Media | 30 November 1999 | ISBN: 0072227850 | PDF | 289 pages | 3 Mb

Text provides a reference on securing Windows 2000 Server, Windows XP system, and Windows Server 2003. Shows how hackers find, probe, and compromise Windows systems; and how to use freeware and built-in Windows security tools.

HackNotes Windows Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques used by criminals to break into computer networks. Understand how the attacks work, then learn how to access and strengthen your Windows systems through a series of tested and trusted anti-hacking methods, bulletproof best practices, and system-level techniques. Use the unique Reference Center in the middle of the book to access key information, including common port numbers, system commands, reference links, the top security assessment and hacker tools, and more.

* Build secure environments using Windows upgrades, tools, and techniques
* Keep systems up-to-date and well patched
* Identify what to protect and guard against by learning hacking techniques
* Block initial entry and limit hacker handholds
* Deploy internal IP Security solutions with ease
* Use Encrypting File System for transparent storage security
* Learn best practices for defending both internal and Internet-facing Windows systems
* Secure IIS installations
* Keep unauthorized parties from accessing sensitive data
* Secure Windows desktops, servers, or entire Active Directory domains
* Review usage and security innovations of Windows Server 2003

Read Full Post »