|
Want to take real control of your Mac? The hacks in this book help you dig below the surface to tweak system preferences, mount drives and devices, and generally do things with your system that Apple doesn’t expect you to do. With a little effort, you can make your Mac and its applications perform exactly the way you want them to.
There are more than 50 hacks in this book that show you how to fine-tune the interface, work with multimedia, set up your network, boost security, and perform a few tricks with Unix.
-
Go beyond Preferences: change the way OS X Mountain Lion behaves
-
Customize your experience by taming browsers and making apps full screen
-
Get information delivered right to your desktop, and automate mundane tasks
-
Use the command line and install various Unix apps to unlock your Mac’s Unix power
-
Increase security, monitor network traffic, and remain anonymous
-
Play Wii games and host a Minecraft server on your Mac
-
Modify your WiFi, move iTunes, and record TV shows
-
Turn your MacBook into a tablet and give it a custom dye job
|
|
|
An Introduction to Object-Oriented Programming with Visual Basic .NET
As you work your way through An Introduction to Object-Oriented Programming with Visual Basic .NET, you'll learn how to analyze the business requirements of an application, model the objects and relationships involved in the solution design and, finally, implement the solution using Visual Basic .NET. Along the way you'll also... | | Data Mining in Finance: Advances in Relational and Hybrid Methods
Data Mining in Finance presents a comprehensive overview of major algorithmic approaches to predictive data mining, including statistical, neural networks, ruled-based, decision-tree, and fuzzy-logic methods, and then examines the suitability of these approaches to financial data mining. The book focuses specifically on relational data mining... | | Information Resources Management: Global ChallengesThe recent surge of technology outsourcing has intensified the cross-cultural effects of information systems designs and constructions, as well as the potential shortage of suitable information specialists at strategic locations. Millions of dollars of investments in information systems are at risk of being underutilized or rejected by users for... |
|