The Whole Internet for Windows 95


Book Description

Updated for Windows 95, this book describes the tools that Windows 95 Internet explorers use to get the most out of the Internet. The best source of information about the World Wide Web, Microsoft Internet Explorer, and Netscape, the book provides thorough coverage of Windows 95 Internet features plus an understanding of how to get and use popular free software for the Internet. Includes a resource index covering important resources ranging from a virtual online university to travel tips.




The Whole Internet


Book Description

Explains how to deal with everyday problems on the Internet such as unsolicited e-mail and security alerts, and tells how to take advantage of new services on the Web, like buying and selling goods, trading stock, and playing games. Others areas covered include downloading and installing files, creating Web pages, banking, and esoteric and emerging technologies. A 60-page resource catalog describes a wide range of sites, plus celebrities' favorite sites. There is also a section on commercial and financial resources. Annotation copyrighted by Book News, Inc., Portland, OR




The Computer User's Survival Guide


Book Description

You probably suspect, on some level, that computers might be hazardous to your health. You might vaguely remember a study that you read years ago about miscarriages being more frequent for data entry operators. Or you might have run into a co-worker wearing splints and talking ominously about Workers' Comp insurance. Or you might notice that when you use a computer too long, you get stiff and your eyes get dry.But who wants to worry about such things? Surely, the people wearing splints must be malingerers who don't want to work? Surely, the people who design keyboards and terminals must be working to change their products if they are unsafe? Surely, so long as you're a good worker and keep your mind on your job, nothing bad will happen to you?The bad news is: You can be hurt by working at a computer. The good news is that many of the same factors that pose a risk to you are within your own control. You can take action on your own to promote your own health -- whether or not your terminal manufacturer, keyboard designer, medical provider, safety trainer, and boss are working diligently to protect you.The Computer User's Survival Guide looks squarely at all the factors that affect your health on the job, including positioning, equipment, work habits, lighting, stress, radiation, and general health.Through this guide you will learn: a continuum of neutral postures that you can at utilize at different work tasks how radiation drops off with distance and what electrical equipment is responsible for most exposure how modern office lighting is better suited to working on paper than on a screen, and what you can do to prevent glare simple breathing techniques and stretches to keep your body well oxygenated and relaxed, even when you sit all day how reading from a screen puts unique strains on your eyes and what kind of vision breaks will keep you most productive and rested what's going on "under the skin" when your hands and arms spend much of the day mousing and typing, and how you can apply that knowledge to prevent overuse injuries The Computer User's Survival Guide is not a book of gloom and doom. It is a guide to protecting yourself against health risks from your computer, while boosting your effectiveness and your enjoyment of work.




Windows 98 Annoyances


Book Description

The author of the popular "Windows Annoyances" takes readers step-by-step through the workarounds for the annoyances found in the new Windows 98 operating system.




Inside the Windows 95 Registry


Book Description

Inside the Windows 95 Registry addresses the needs of both groups of developers by demystifying the registry, showing how the Win32 registry API can be used to get information into and out of the registry, and examining the kinds of system, application, and user information that applications can store in the registry. The book features: Coverage of the registry in both Windows 95 and Windows NT 3.x and 4.0 that allows developers to create 32-bit applications that run on both platforms. Many coding examples in both C and Visual Basic. Numerous undocumented topics, like the registry locking scheme, accessing the Window 95 registry from Win 16 and DOS programs, how the Win32 registry API is implemented in Windows 95, and bugs in the registry API when used for remote registry access under Windows 95. Documentation of a number of registry settings. This, along with the book's thorough discussion of RegEdit and its presentation of graduated techniques for backing up the registry and restoring a damaged registry, makes the book important for system administrators and 'power users' as well as developers. Thorough coverage of Remote Registry Access. The diskette accompanying Inside the Windows 95 Registry features a diverse collection of registry tools and utilities, including RegSpy95, a configurable spying utility that intercepts all calls to the registry from the Windows Virtual Machine Manager. Using RegSpy95, you can see what data Windows 95 and individual applications write to and read from the registry; you can even see what data Windows and applications look for, but fail to find, in the registry.




Managing IP Networks with Cisco Routers


Book Description

The basics of IP networking. Network design part 1 & 2. Selecting network equipment. Routing protocol selection. Routing protocol configuration. The non-technical side of network management. The technical side of network management. Connecting to the outside world. Network security.




The Harvard Conference on the Internet & Society


Book Description

Today's hottest Internet technologies, they also explore the important issues regarding precisely what is at stake for a society with greater and growing ties to cyberspace. Topics in this timely collection include privacy and security, property rights, censorship, telecommunications regulation, and the global impact of emerging Internet technologies.




The Whole Internet


Book Description

A user's guide to Internet, a computer network, explaining the resources of the network and how to use them. This edition includes an expanded, subject oriented resource catalog that points you to the resources you want.




Java Distributed Computing


Book Description

Distributed computing and Java go together naturally. As the first language designed from the bottom up with networking in mind, Java makes it very easy for computers to cooperate. Even the simplest applet running in a browser is a distributed application, if you think about it. The client running the browser downloads and executes code that is delivered by some other system. But even this simple applet wouldn't be possible without Java's guarantees of portability and security: the applet can run on any platform, and can't sabotage its host.Of course, when we think of distributed computing, we usually think of applications more complex than a client and server communicating with the same protocol. We usually think in terms of programs that make remote procedure calls, access remote databases, and collaborate with others to produce a single result. Java Distributed Computing discusses how to design and write such applications. It covers Java's RMI (Remote Method Invocation) facility and CORBA, but it doesn't stop there; it tells you how to design your own protocols to build message passing systems and discusses how to use Java's security facilities, how to write multithreaded servers, and more. It pays special attention to distributed data systems, collaboration, and applications that have high bandwidth requirements.In the future, distributed computing can only become more important.Java Distributed Computing provides a broad introduction to the problems you'll face and the solutions you'll find as you write distributed computing applications.Topics covered in Java Distributed Computing: Introduction to Distributed Computing Networking Basics Distributed Objects (Overview of CORBA and RMI) Threads Security Message Passing Systems Distributed Data Systems (Databases) Bandwidth Limited Applications Collaborative Systems




Java Threads


Book Description

Threads (Computer programs).