eBooks-it.org Logo
eBooks-IT.org Inner Image

Hacks eBooks Page 5

Download free Hacks eBooks Page 5

Linux Multimedia Hacks

Tips & Tools for Taming Images, Audio, and Video
Linux Multimedia Hacks Image
The fact that Linux has more multimedia application choices than Mac OS X and Windows combined may come as a surprise to many, but not to those who know Linux well. In Linux Multimedia Hacks, author Kyle Rankin showcases the best available multimedia tools so you can maximize the entertainment capabilities of your favorite OS. Included are tips and tricks for connecting to iPods, creating MP3s and Oggs, watching and making DVDs, turning your Linux box into a Tivo ala MythTV, and much more. You don't have to be a Linux server guru to make use of this book. Linux Multimedia Hacks takes the best of Linux's multimedia tools and with step-by-step instructions shows even novice users how to do cool and useful things with images, audio, and video. It includ...

HTML5 Hacks

HTML5 Hacks Image
With 90 detailed hacks, expert web developers Jesse Cravens and Jeff Burtoft demonstrate intriguing uses of Html5-related technologies. Each recipe provides a clear explanation, screenshots, and complete code examples for specifications that include Canvas, Svg, Css3, multimedia, data storage, web workers, WebSockets, and geolocation. Youamp;#8217;ll also find hacks for Html5 markup elements and attributes that will give you a solid foundation for creative recipes that follow. The last chapter walks you through everything you need to know to get your Html5 app off the ground, from Node.js to deploying your server to the cloud. Here are just a few of the hacks youamp;#8217;ll find in this book:Make iOs-style card flips with Css transforms and transiti...

Google Hacks

Tips & Tools for Smarter Searching
Google Hacks Image
2nd Edition
Whether you're a high school student looking for the latest info on your favorite rock group, or a seasoned attorney researching an old case, you're probably using Google. It seems like everyone is. And who can blame them? With access to more than three million documents in over 30 languages, Google is a researcher's dream. It's no wonder, then, that nearly 150 million Google searches are conducted each day. As a result, people are hungry to learn new ways to maximize its usefulness.Truth is, there are dozens upon dozens of techniques to learn--each designed to make your Google search more time-efficient, more productive, and more fun. And Google Hacks...

Skype Hacks

Tips & Tools for Cheap, Fun, Innovative Phone Service
Skype Hacks Image
If you've heard about Skype--and who hasn't with all the recent media attention devoted to internet telephone services--chances are you've been mighty tempted to try it out. Skype Hacks tells you what all the Skype hype is about, explains the basics, and shows you more than 100 clever tips and tricks for tweaking and tuning Skype to make it do just what you want and more. Millions of people (48 million and counting, in fact) have opted for Skype, which uses peer-to-peer (P2P) technology to turn any PC, Mac, or Pocket PC into a telephone. Skype offers free calls between computers and extremely cheap calls to "old-fashioned" phone numbers (landlines and mobile phones). The sound quality is excellent, and end-to-end encryption means the connec...

Network Security Hacks

Network Security Hacks Image
To the uninitiated, the title may seem like an oxymoron: after all, aren't hacks what network security is supposed to prevent? But if you're network administrator, this book's title not only makes sense; it makes a lot of sense. You know that a busy administrator needs a hatful of devilishly effective security hacks to keep your 12-hour days from becoming all-nighters.Network Security Hacks is not a long-winded treatise on security theory. Instead, this information packed little book provides 100 quick, practical, and clever things to do to help make your Linux, UNIX, or Windows networks more secure today.This compendium of security hacks doesn't just cover securing TCP/IP-based services, but also provides intelligent host-based security techniques. ...



2007 - 2017 © eBooks-IT.org