Flylib.com
Running Mac OS X Tiger: A No-Compromise Power Users Guide to the Mac (Animal Guide)
Running Mac OS X Tiger: A No-Compromise Power Users Guide to the Mac (Animal Guide)
ISBN: 0596009135
EAN: 2147483647
Year: 2004
Pages: 166
Authors:
Jason Deraleau
,
James Duncan Davidson
BUY ON AMAZON
Running Mac OS X Tiger
Table of Contents
Copyright
Preface
Audience
How This Book Is Organized
How to Use This Book
Compatibility
Conventions Used in This Book
Using Code Examples
Safari Enabled
How to Contact Us
Acknowledgments
Acknowledgments from the First Edition
Chapter 1. Where It All Came From
Section 1.1. The Classic Mac OS
Section 1.2. System 7
Section 1.3. Copland
Section 1.4. NEXTSTEP
Section 1.5. Rhapsody
Section 1.6. Continued Development of the Classic Mac OS
Section 1.7. Mac OS X 10.0
Section 1.8. Mac OS X 10.1
Section 1.9. Mac OS X 10.2 Jaguar
Section 1.10. Mac OS X Panther
Section 1.11. Mac OS X Tiger
Section 1.12. What Does the Future Hold?
Chapter 2. Installing the System and Software
Section 2.1. Preparing to Install Tiger
Section 2.2. Installing Tiger
Section 2.3. The Software of Mac OS X
Section 2.4. Staying Up-to-Date
Section 2.5. Further Explorations
Chapter 3. Lay of the Land
Section 3.1. The World s Most Advanced Operating System
Section 3.2. Filesystem Hierarchy
Section 3.3. The Many Roots of the Finder
Section 3.4. Filesystem Domains
Section 3.5. The Library
Section 3.6. Bundles
Section 3.7. Further Explorations
Chapter 4. The Terminal and Shell
Section 4.1. Terminal Overview
Section 4.2. Configuring and Using bash
Section 4.3. Using Other Shells
Section 4.4. Getting Help
Section 4.5. Editing Text Files
Section 4.6. Further Explorations
Chapter 5. System Startup and Login
Section 5.1. The Hardware Boot Process
Section 5.2. The Operating System Boot Process
Section 5.3. Logging In
Section 5.4. Logging Out
Section 5.5. Shutting Down the System
Section 5.6. Energy Preferences
Section 5.7. Further Explorations
Chapter 6. Users and Groups
Section 6.1. What Is a User Anyway?
Section 6.2. Managing Users
Section 6.3. Nonhuman Users
Section 6.4. Further Explorations
Chapter 7. Open Directory
Section 7.1. Open Directory in Action
Section 7.2. Directory Services Defined
Section 7.3. Directory Domains
Section 7.4. The Local Domain and NetInfo
Section 7.5. Configuring Shared Domains
Section 7.6. Kerberosand Single Sign-on
Section 7.7. Command-Line Open Directory Tools
Section 7.8. Further Explorations
Chapter 8. Files and Permissions
Section 8.1. Finding Files
Section 8.2. Owners and Access
Section 8.3. Metadata and File Attributes
Section 8.4. Further Explorations
Chapter 9. Disks and Filesystems
Section 9.1. Filesystems
Section 9.2. Network-Based Filesystems
Section 9.3. Disk Utility
Section 9.4. Erasing and Formatting Disks
Section 9.5. Partitioning Disks
Section 9.6. RAID
Section 9.7. Disk Images
Section 9.8. Further Explorations
Chapter 10. Printing
Section 10.1. Print System Overview
Section 10.2. Managing Printers
Section 10.3. Adding and Configuring Printers
Section 10.4. Anatomy of a Print Job
Section 10.5. PDF Services
Section 10.6. Printing from the Command Line
Section 10.7. Print Sharing
Section 10.8. Further Explorations
Chapter 11. Networking
Section 11.1. The Internet Protocol
Section 11.2. Configuring IP Addresses
Section 11.3. Naming and DNS
Section 11.4. Private Networks and NAT
Section 11.5. Routing
Section 11.6. Active Network Connections
Section 11.7. AppleTalk
Section 11.8. Locations
Section 11.9. Using a Dial-Up Connection
Section 11.10. FireWire Networking
Section 11.11. Virtual Private Networks
Section 11.12. Firewalls
Section 11.13. Internet Connection Sharing
Section 11.14. Further Explorations
Chapter 12. Monitoring the System
Section 12.1. About This Mac
Section 12.2. System Profiler
Section 12.3. Monitoring System Activity
Section 12.4. Monitoring Users
Section 12.5. Working with Processes
Section 12.6. Remote Maintenance
Section 12.7. Further Explorations
Chapter 13. Automating Tasks
Section 13.1. The Importance of Time
Section 13.2. Using iCal to Schedule Tasks
Section 13.3. cron
Section 13.4. Automator
Section 13.5. Scripting
Section 13.6. Further Explorations
Chapter 14. Preferences and Defaults
Section 14.1. Property Lists
Section 14.2. Where Preferences Are Stored
Section 14.3. Reading and Writing Preferences
Section 14.4. Determining Preference Keys
Section 14.5. Further Explorations
Appendix A. Boot Command Keys
Appendix B. Other Sources of Information
Section B.1. Books
Section B.2. Magazines
Section B.3. Mailing Lists
Section B.4. Web Sites
About the Authors
Colophon
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Running Mac OS X Tiger: A No-Compromise Power Users Guide to the Mac (Animal Guide)
ISBN: 0596009135
EAN: 2147483647
Year: 2004
Pages: 166
Authors:
Jason Deraleau
,
James Duncan Davidson
BUY ON AMAZON
Beginning Cryptography with Java
Distinguished Names and Certificates
Certificate Revocation and Path Validation
Key and Certificate Management Using Keystores
CMS and S/MIME
Appendix A Solutions to Exercises
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
Creating an Intercom
Implementing Overlays
Dial Plan Considerations
Step 8: Interconnecting Multiple Cisco IPC Express Systems
Troubleshooting H.323 GK Integration
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Part I - The Underpinning Theory
Individual change
Organizational change
Mergers and acquisitions
IT-based process change
The Java Tutorial: A Short Course on the Basics, 4th Edition
What Is Inheritance?
Variables
The Life Cycle of an Object
Working with Random Access Files
Operator Precedence
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 12. How Far Is That? Go Beyond Driving Directions
Hack 42. Get More out of What You Read
Hack 46. Browse Photography by Shooting Location
Hack 67. Serve Custom Map Imagery
Hack 70. Will the Kids Barf? (and Other Cool Ways to Use Google Maps)
The Oracle Hackers Handbook: Hacking and Defending Oracle
The Oracle Network Architecture
Oracle and PL/SQL
Defeating Virtual Private Databases
Attacking Oracle PL/SQL Web Applications
Accessing the Network
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies