Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • Safari, an O'Reilly Media Company.  (5)
  • Application software Development  (2)
  • Commerce  (2)
  • Computer security ; Management
Datenlieferant
Materialart
Sprache
Erscheinungszeitraum
  • 1
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : Take Control Books | Boston, MA : Safari
    ISBN: 9781947282445
    Sprache: Englisch
    Seiten: 1 online resource (229 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Mac OS ; Application software Development ; Electronic books ; local ; Electronic books ; Mac OS ; Logiciels d'application ; Développement ; Application software ; Development
    Kurzfassung: In macOS 10.15 Catalina, Apple finally did away with iTunes. In its place are three new apps-Music, TV, and Podcasts-with audiobooks now handled by the Books app and syncing of mobile devices handled by the Finder. Where once iTunes was an all-purpose media hub, now you may use up to five apps to accomplish the same things. The new apps also add more features (while, sadly, removing a few things too). Take Control of macOS Media Apps is your guide to this new, post-iTunes world. Kirk McElhearn, whose earlier books on iTunes 10, 11, and 12 collectively sold nearly 14,000 copies, is back with a new book that shows you how to manage your music, videos, podcasts, and audiobooks in Catalina. Whether you just want to play your media, or you want to go deeper with special features like Genius, Shuffle, Up Next, Apple Music, and iTunes Match, this comprehensive guide has the answers you need. Kirk also looks at various ways of bringing audio and video into Apple's media apps, tagging songs and videos so you can find them more easily later, creating playlists, sharing your library over a home network, and syncing media with your iPhone, iPad, or iPod. The book covers how to: Play Music: Learn the basics of playing audio (and even music videos) in the Music app. You'll also find tips on making quick playlists with Genius and Up Next, learn the best ways to search for the music you want to hear, stream music to other devices in your home, and view lyrics while tunes play. Stream Music: Use Apple Music, a paid service, to listen to any of 50 million tracks. Or listen to live broadcasts from Apple Music Radio (including Beats 1). View Your Music and Other Content: Learn how to use the sidebar, view your music library, and work with contextual menus in the Music app. Store Your Music Library in the Cloud: What are the pros and cons of Apple's Cloud Music Library? How do Music and iTunes Match figure out whether to upload your music when setting up your Cloud Music Library? You'll get answers to these questions and more. Use the iTunes Store: iTunes may be gone, but the iTunes Store is still open for business! Find tips on shopping in the iTunes Store, and get advice on sharing your purchases with family members and among your various Apple devices. Tag Your Music: Tags are bits of information (also known as "metadata") that can describe your media. Learn which tags to bother changing, the best ways to add lyrics and album art, how to rate songs with stars, ...
    Anmerkung: Online resource; Title from title page (viewed January 21, 2020) , Mode of access: World Wide Web.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Sprache: Englisch
    Seiten: 1 online resource (954 pages)
    Ausgabe: 2nd edition
    Schlagwort(e): Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Kurzfassung: The concept of Crime Prevention Through Environmental Design (CPTED) has undergone dramatic changes over the last several decades since C. Ray Jeffery coined the term in the early 1970s, and Tim Crowe wrote the first CPTED applications book. The second edition of 21st Century Security and CPTED includes the latest theory, knowledge, and practice of CPTED as it relates to the current security threats facing the modern world: theft, violent crime, terrorism, gang activity, and school and workplace violence. This significantly expanded edition includes the latest coverage of proper lighting, building design-both the interior and exterior-physical security barriers, the usage of fencing, bollards, natural surveillance, landscaping, and landscape design. Such design concepts and security elements can be applied to address a wide variety of threats including crime prevention, blast mitigation, and CBRNE threat protection. Authored by one of the U.S.'s renowned security experts-and a premiere architect and criminologist-the book is the most comprehensive examination of CPTED and CPTED principles available. This edition includes a complete update of all chapters in addition to five new chapters, over 700 figure illustrations and photos, numerous tables and checklists, and a 20-page color plate section. This latest edition: Features five new chapters including green and sustainable buildings, infrastructure protection, and premises liability Presents step-by-step guidelines and real-world applications of CPTED concepts, principles and processes-from risk assessment to construction and post-occupancy evaluation Outlines national building security codes and standards Examines architectural surety from the perspective of risk analysis and premises liability Demonstrates CPTED implementation in high-security environments, such as hospitals, parks, ATMs, schools, and public and private sector buildings A practical resource for architects, urban planners and designers, security managers, law enforcement, CPTED practitioners, building and property managers, homeland security professionals, and students, 21st Century Security and CPTED, Second Edition continues to serve as the most complete and up-to-date reference available on next-generation CPTED practices today.
    Anmerkung: Online resource; Title from title page (viewed June 25, 2013) , Mode of access: World Wide Web.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    ISBN: 0738438464 , 9780738438467
    Sprache: Englisch
    Seiten: 1 online resource (638 pages)
    Serie: IBM Redbooks
    Paralleltitel: Erscheint auch als
    DDC: 005.376
    Schlagwort(e): WebSphere ; Computational grids (Computer systems) ; Application software Development ; Client/server computing ; Web servers Computer programs ; Electronic books ; local ; WebSphere ; WebSphere ; Electrical & Computer Engineering ; Engineering & Applied Sciences ; Telecommunications ; Grilles informatiques ; Logiciels d'application ; Développement ; Architecture client-serveur (Informatique) ; Serveurs Web ; Logiciels ; Application software ; Development ; Client/server computing ; Computational grids (Computer systems) ; Web servers ; Computer programs
    Kurzfassung: This IBM® Redbooks® publication provides information about the concepts, planning, and design of IBM WebSphere® Application Server V8.5 environments. The target audience of this book is IT architects and consultants who want more information about the planning and design of application-serving environments, from small to large, and complex implementations. This book addresses the packaging and features in WebSphere Application Server V8.5, and highlights the most common implementation topologies. It provides information about planning for specific tasks and components that conform to the WebSphere Application Server environment. Also in this book are planning guidelines for Websphere Application Server V8.5 and Websphere Application Server Network Deployment V8.5 on distributed platforms. It also includes guidelines for WebSphere Application Server for IBM z/OS® V8.5. This book contains information about migration considerations when moving from previous releases. Please note that the additional material referenced in the text is not available from IBM.
    Anmerkung: Online resource; Title from title page (viewed June 25, 2012) , Mode of access: World Wide Web.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    ISBN: 9780429251306 , 0429251300 , 9780511324840 , 0511324847 , 9781439869147 , 1439869146 , 9781466514157 , 1466514159 , 9781439869123
    Sprache: Englisch
    Seiten: 1 online resource (430 pages)
    Ausgabe: 3rd edition
    Paralleltitel: Erscheint auch als
    DDC: 363.25/968
    Schlagwort(e): Money laundering investigation ; Money laundering Prevention ; Business enterprises ; Finance ; Economics ; Commerce ; Electronic books ; local ; Blanchiment de l'argent ; Enquêtes ; États-Unis ; Money laundering investigation ; Money laundering ; Prevention ; United States
    Kurzfassung: Many changes have occurred in the twenty-five years that have passed since the enactment of the Money Laundering Control Act of 1986. The law has been amended, new underlying crimes have been added, and court decisions have modified its scope. The Act remains an important tool in combating criminal activity. Now in its third edition, Money Laundering: A Guide for Criminal Investigators covers the basics of finding ill-gotten gains, linking them to the criminal, and seizing them. Providing a clear understanding of money laundering practices, it explains the investigative and legislative processes that are essential in detecting and circumventing this illegal and dangerous activity. Highlights of the Third Edition include Important court decisions and changes in federal law since the Second Edition New trends in crime and terrorism financing The rise of money laundering in connecting with major frauds, including the Bernie Madoff case Law and policy shifts related to terrorism and financing since the Obama administration New methods for financial intelligence and the filing of Suspicious Activity Reports How changes in technology have enabled launderers to move funds more easily and anonymously Knowledge of the techniques used to investigate these cases and a full understanding of the laws and regulations that serve as the government's weapons in this fight are essential for the criminal investigator. This volume arms those tasked with finding and tracing illegal proceeds with this critical knowledge, enabling them to thwart illegal profiteering by finding the paper trail.
    Anmerkung: Online resource; Title from title page (viewed December 19, 2011) , Mode of access: World Wide Web.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    ISBN: 0738495603
    Sprache: Englisch
    Seiten: 1 online resource (356 pages)
    Serie: IBM redbooks
    Paralleltitel: Erscheint auch als
    Schlagwort(e): Business Forms ; Computer programs ; Forms management Computer programs ; IBM software ; Electronic books ; local ; Gestion des formulaires ; Logiciels ; Logiciels IBM ; Gestion des formulaires ; Logiciels ; Business ; Forms ; Computer programs ; Forms management ; Computer programs ; IBM software ; Commerce ; Business & Economics ; Local Commerce
    Kurzfassung: This IBM Redbooks publication describes the features and functionality of Workplace Forms and each of its component products. After introducing the products and providing an overview of features and functionality, we discuss the underlying product architecture and address the concept of integration. To help potential users, architects, and developers better understand how to develop and implement a forms application, we introduce a specific scenario based on a "Sales Quotation Approval" application. Using this base scenario as a foundation, we describe in detail how to build an application that captures data in a form, then applies specific business logic and workflow to gain approval for a specific product sales quotation. Throughout the scenario, we build upon the complexity of the application and introduce increasing integration points with other data systems. Ultimately, we demonstrate how an IBM Workplace Forms application can integrate with WebSphere Portal, IBM DB2 Content Manager, and Lotus Domino. Note: The code used for building this sample scenario application is available for download. For specific information about how to download the sample code, please refer to Appendix A. Additional material". Please note that the additional material referenced in the text is not available from IBM.
    Anmerkung: Online resource; Title from title page (viewed July 12, 2006) , Mode of access: World Wide Web.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...