Inside MS-DOS 6.2


Book Description

Inside MS-DOS 6.2 will address the needs of the intermediate-to-advanced DOS user who is upgrading to DOS 6.2, as well as those using DOS 6.0. The disk includes a pop-up directory finder, smart disk-copy program, and virus detection program and associated database, and other useful utilities that MS-DOS 6.2 forgot.




Microsoft MS-DOS Programmer's Reference


Book Description

Microsoft's official reference to its venerable and omnipresent operating system. The heart of the volume is a comprehensive 280-page reference to the MS-DOS system calls. The book also contains chapters on the file system, character I/O, program management, national language support, and device drivers.




DOS 6


Book Description

Over 70 million users eagerly await the release of the new version of DOS, the standard operating system for most IBM PC and compatible users. This guide presents a step-by-step tutorial approach to mastering the many important features of this extremely powerful system. It presents detailed discussion of the essential "basics" for efficient DOS usage.




Understanding MS-DOS


Book Description

If there's a single piece of software nearly every PC user wrestles with, it's MS-DOS. This second edition of "Understanding MS-DOS" gives easy-to-follow explanation for MS-DOS fundamentals to get users up and running. There is advanced material on special topics like using batch files and filters, and complete instructions on using the features of MS-DOS version 4.







InfoWorld


Book Description

InfoWorld is targeted to Senior IT professionals. Content is segmented into Channels and Topic Centers. InfoWorld also celebrates people, companies, and projects.




The MS-DOS Encyclopedia


Book Description

This newly updated and expanded volume contains detailed, thorough and accurate information on MS-DOS written for advanced-level programmers of all environments. Contains an index and appendixes.




A+ Exam Cram 2


Book Description

A+ Exam Cram 2 is a study skill enhancement and tutorial, designed to focus on exactly what students need to get A+ certified, with coverage of exams 220-221 and 220-222. It details all the new exam objectives and items in the following areas: Windows 98, Windows 2000, and Windows NT version 4.0. Because the A+ certification is a core competency of the MCSA program, this book is also helpful for those who are seeking their MCSA certification. This book is not intended to teach new material. Instead it assumes that you have a solid foundation of knowledge but can use a refresher on important concepts as well as a guide to exam topics and objectives. This book focuses exactly on what you need to pass the exam - it features test-taking strategies, time-saving study tips, and a special Cram Sheet that includes tips, acronyms, and memory joggers not available anywhere else. The series is supported online at several Web sites: examcram.com, informit.com, and cramsession.com. The accompanying CD features PrepLogic(TM) Practice Tests, Preview Edition. This product includes one complete PrepLogic Practice Test with approximately the same number of questions found on the actual vendor exam. Each question contains full, detailed explanations of the correct and incorrect answers. The engine offers two study modes, Practice Test and Flash Review, full exam customization, and a detailed score report.




InfoWorld


Book Description

InfoWorld is targeted to Senior IT professionals. Content is segmented into Channels and Topic Centers. InfoWorld also celebrates people, companies, and projects.




Forensic Computing


Book Description

In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how the contents of computer systems can be recovered, even when hidden or subverted by criminals. Equally important, they demonstrate how to insure that computer evidence is admissible in court. Updated to meet ACPO 2003 guidelines, Forensic Computing: A Practitioner's Guide offers: methods for recovering evidence information from computer systems; principles of password protection and data encryption; evaluation procedures used in circumventing a system’s internal security safeguards, and full search and seizure protocols for experts and police officers.