Udvidet returret til d. 31. januar 2025

Bøger af William Rowley

Filter
Filter
Sorter efterSorter Populære
  • af William Rowley
    301,95 kr.

    This play tells the story of the magician Merlin's birth and early life, with all the intrigue, romance, and magic that one would expect from a Shakespearean comedy. Originally published in 1662, this play has delighted audiences for centuries and remains a beloved work of literature today. This edition includes an introduction and notes for modern readers.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it.This work is in the "public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

  • - Or, A New Way to Please You
    af William Rowley
    98,95 kr.

    The Old Law, or A New Way to Please You is a seventeenth-century tragicomedy written by Thomas Middleton, William Rowley, and Philip Massinger. It was first published in 1656, but is generally thought to have been written about four decades earlier.

  • - Guide for Beginners
    af William Rowley
    148,95 kr.

    This book is an exploration of Linux Mint, which is a Linux distribution. It has been updated to Linux Mint 18.0, which is the latest version of this Linux distribution. The first part of the book is a guide to Linux Mint. The reader will learn the features and benefits which one can enjoy when using this kind of operating system, and some of the tasks which they can perform. The book then guides you on how you can install Linux Mint on your system. This includes the initial steps of downloading the ISO image of Linux Mint, and then burning it to the DVD. You will learn how to test the downloaded ISO so as to know whether it has errors or not. The book explains how you can use this operating system from the DVD, what is known as a "live DVD." You will also learn how to install it as the only operating system on your PC or alongside another operating system. The process of managing software and packages in Linux Mint is explored in detail. This involves grouping the software into packages, performing upgrades, and managing other tasks. Linux Mint is discussed in detail, and you will learn the purpose of some of the features you will be seen in the desktop and how to use them. Some of the best tricks in Linux Mint, such as the various ways of copying and pasting text, as well as taking notes using the best applications is discussed, so you will learn how to perform such tasks.

  • - An introduction to Raspberry Pi for beginners
    af William Rowley
    128,95 kr.

    Raspberry Pi 2An introduction to Raspberry Pi for beginnersRaspberry Pi 2 marked a great improvement from what we had in the previous models of Raspberry. This improvement is in terms of performance due an improvement in the processor speed and amount of storage. This explains why most people have greatly turned to use them in schools for teaching the basics of computer science, and particularly programming.Here is a preview of what you'll learn: Accessing Raspberry Pi 2 via SSHManagement of Raspberry Pi 2Using Raspberry Pi 2 as a Media and File Share ServerInstalling Bluetooth on Raspberry Pi 2Backup and Recovery of the SD CardBackup and Recovery of the SD CardRaspberry Pi 2 musicboxTurning the Raspberry Pi 2 into a Retro Game ConsoleBitTorrent SyncRaspberry Pi 2 Tor ServerDownload your copy of "Raspberry Pi 2" by scrolling up and clicking "Buy Now With 1-Click" button.

  • - What's new? An Introduction to the newest Operating System of Microsoft
    af William Rowley
    113,95 kr.

    Most of you are waiting for the official release of Windows 10. The Operating system will come in various versions. Windows phones and tablets will be able to support this operating system. The same case applies to Intel-based PCs and laptops. However, the OS comes with advancements and as well as new features into the computing world. These changes range from the time of logging into the system up to when using the system. This is you should know how to use this OS.Here is a preview of what you'll learn: The minimum hardware requirements required for this operating system to run are also explainedThe book will guide you from the time booting your computer running this OS, logging into the system and performing various operationsBackup and recovery of files and data in Windows 10How to create a USB recovery drive in Windows 10After reading this book, you will be able to boot into either Advanced Startup Options or Safe mode in Windows 10

  • af William Rowley
    178,95 kr.

  • - Disappearing from the Web (Internet Security, Darknet)
    af William Rowley
    133,95 kr.

    This book is a guide for Internet users on how to stay anonymous. There are many reasons why you may need to stay anonymous online. Emails are a risk to anyone who needs to stay anonymous online. This is also the case with the files which you send online. This calls for you to encrypt them so as to be sure that you are anonymous. This book guides you on the best tools to use for encrypting your emails and files. Cookies, which are used in browsers, pose a risk to anonymity. They are capable of collecting your data and then sending it to a third party. This book guides you on how to kill cookies which have been installed in your browser so that you can stay anonymous. Any device that you use to access the Internet is identified by a unique address, which is referred to as the Media Access Control (MAC) address. Since this address can be obtained as you surf the Internet, your activities may be traced back to the device, and this is risky. This book guides you on how to change the MAC address of your device so that you can surf the Internet anonymously. Crypto currencies such as Bitcoin can be used anonymously. This book guides you on how to do this. The book helps you learn how to mask IP addresses by use of Chain Proxies. The book also guides you on how to download torrents anonymously.

  • af William Rowley
    188,95 kr.

    This is a reproduction of a book published before 1923. This book may have occasional imperfections such as missing or blurred pages, poor pictures, errant marks, etc. that were either part of the original artifact, or were introduced by the scanning process. We believe this work is culturally important, and despite the imperfections, have elected to bring it back into print as part of our continuing commitment to the preservation of printed works worldwide. We appreciate your understanding of the imperfections in the preservation process, and hope you enjoy this valuable book. ++++ The below data was compiled from various identification fields in the bibliographic record of this title. This data is provided as an additional tool in helping to ensure edition identification: ++++ A Treatise On Madness And Suicide William Rowley

  • - And a Shoemaker, a Gentleman, Volume 13
    af William Rowley
    240,95 kr.

    This is a reproduction of a book published before 1923. This book may have occasional imperfections such as missing or blurred pages, poor pictures, errant marks, etc. that were either part of the original artifact, or were introduced by the scanning process. We believe this work is culturally important, and despite the imperfections, have elected to bring it back into print as part of our continuing commitment to the preservation of printed works worldwide. We appreciate your understanding of the imperfections in the preservation process, and hope you enjoy this valuable book. ++++ The below data was compiled from various identification fields in the bibliographic record of this title. This data is provided as an additional tool in helping to ensure edition identification: ++++ William Rowley, His All's Lost By Lust: And A Shoemaker, A Gentleman, Volume 13; Volume 13, Issue 1 Of Publications Of The University Of Pennsylvania: Series In Philology And Literature; William Rowley, His All's Lost By Lust: And A Shoemaker, A Gentleman; William Rowley; Series In Philology And Literature; University Of Pennsylvania William Rowley Charles Wharton Stork null Pub. for the University, 1910

  • - How to Start: Beginners Guide Book
    af William Rowley
    133,95 kr.

    This book is an exploration of the RaspBerry Pi 3 which is the immediate successor of the RaspBerry Pi 2. It begins by exploring in detail the accessories which are necessary to be able to use the Pi 3 device. The process of installing the Windows 10 IOT Core Insider Preview in the RaspBerry Pi 3 is also discussed in detail, and you will learn how to do it. You will also learn how to configure it once you are done with the installation. You are also guided on how to install the Raspbian Jessie operating system on the Pi 3 device. The Pi 3 device also supports the use of WiFi and Bluetooth. This book guides you on how to setup the WiFi and Bluetooth connections on the Pi 3 device. You will also learn how to connect devices such as a wireless keyboard and a Bluetooth speaker to your Pi 3 device. You are also guided on how to interface the RaspBerry Pi 3 with an ultrasonic sensor. This is helpful for you when you need to read some serial data. OpenCV can be used on Pi 3. You will learn how to set it up on the device, as well as how to use RetroPie on the Raspberry Pi 3.

  • - The Basics of Linux Kernel Development
    af William Rowley
    138,95 kr.

    This book is an exploration of the Linux Kernel. The first part of the book is a guide for you on how to work with the Initial RAM Disk (initrd). This simply provides us with an easy way to load the RAM disk using the boot loader. The necessary steps which can help you achieve this, and the necessary tools for you have been discussed. The tools which can be used for kernel development are discussed in this book. The first tool discussed in this book is the kcov. The book guides you on how to get started with this tool for the purpose of kernel development to the final stages. The coccinelle, which is a tool for kernel development is also examined in this book. This is a good tool which can help you in pattern matching and in the transformation of text. You are guided on how to install this tool and then how to use it for the purpose of kernel development. Lastly, the book guides you on how to write or create the Linux kernel modules. This means that you will learn how to create modules for the Linux kernel on your own.

  • - Penetration Testing with Kali Linux: Guide for Beginners
    af William Rowley
    148,95 kr.

    This book is a guide on how to use Kali Linux for penetration testing. It begins by guiding you on how to use the "Sqlmap" tool to perform an SQL injection. This will help you seal any loopholes in your databases. The book then guides you on how to use a tool named "Fluxion" so as to hack networks which are protected by WPA/WPA2. Brute forcing has been used for carrying out this kind of attack. You will also learn how to check or know the location for a particular IP address in the world. You will learn how to get details about this location in terms of longitude, country, and other parameters. The process of hiding or spoofing MAC addresses for your devices is very important for penetration testing. This book guides you on how to spoof the MAC address of your devices. After developing a website or before you can hack a website, it is good for you to scan it and identify any loopholes or vulnerabilities within it. You can then go ahead and exploit these vulnerabilities, or seal them to prevent a disaster. This book guides you on how to scan a website and identify any vulnerability within it. You are guided on how to hack Android phones by the use of Kali Linux. HTP servers usually have an open FTP port. This book guides you on how to use this port and gain access to the server. You will also know how to carry out a mass mailer attack, as well as password cracking in Kali Linux.

  • af William Rowley
    368,95 kr.

    This is a reproduction of a book published before 1923. This book may have occasional imperfections such as missing or blurred pages, poor pictures, errant marks, etc. that were either part of the original artifact, or were introduced by the scanning process. We believe this work is culturally important, and despite the imperfections, have elected to bring it back into print as part of our continuing commitment to the preservation of printed works worldwide. We appreciate your understanding of the imperfections in the preservation process, and hope you enjoy this valuable book. ++++ The below data was compiled from various identification fields in the bibliographic record of this title. This data is provided as an additional tool in helping to ensure edition identification: ++++ Praktische Abhandlung Über Die Frauenzimmerkrankheiten William Rowley

  • - Penetration Testing for Novices
    af William Rowley
    98,95 kr.

    This book is a guide for you on how to use Metasploit. The first part of the book is a guide for you on how to get started with Metasploit. You are guided on how to install Metasploit on Windows and in Linux. You are also guided on how to start Metasploit, both the Graphical User Interface (GUI) and the command line. The book also guides you on how to work with databases and workspaces in Metasploit. The process of backing up data in Metasploit is also discussed. The basic Metasploit commands are examined in detail. You will learn the options which each command takes. Enumeration is also explored in detail. You will learn how to enumerate your target hosts so as to get details about them. The book guides you on how to exploit web applications with Metasploit. Metapsloit can be used to sniff packets which are being sent via a particular interface on a computer. Such packets can then be analyzed with tools such as wireshark. This book guides you on how to sniff packets. You will also learn how to escalate the privileges when logged into a certain computer and be able to perform administrative tasks. Keylogging, which can help you capture keystrokes, is also explored.

  • - Short guide and additional help to passing your exam
    af William Rowley
    113,95 kr.

    This book explores everything that you need to know so as to pass the CCNA Routing and Switching (ICND1 100-105, ICND2 200-105, and CCNA 200-125) exam. The author has explored the various topics that are tested in the exam. Every topic has been explored in detail, both theoretically and practically. Each chapter is accompanied by theoretical explanations as well as practical sessions. The various networking commands needed to configure networking devices have been discussed. The author has added screenshots alongside these commands showing how these commands should run. Enjoy reading!Keywords: network protocol, ccna routing and switching, storage area networks, ccna security, ccna cloud, ccna data center, network security, computer networking books, computer networking basics, computer networking for dummies, network devices, network marketing, osi model, ospf

  • - The Best Introduction to the Linux System for beginners
    af William Rowley
    123,95 kr.

    Linux is an open source operating system for computers. The fact that it is an open source system doesn't mean that it is totally free, as some of its distributions will incur you some costs while using them. There are various distributions of Linux and one should choose the one to use depending on their choice. Some suits for personal use, while others are good for use in production environments. The version of Linux used in server computers does not support graphics but only the command line. Graphics are seen to be too complex for novice users. If you're not good in using this command line, then you will be stack. This book will guide you on how to use the Linux command line.Here is a preview of what you'll learn: Basic Linux commandsAdvanced commands in LinuxNetwork managementUser managementBackup and Recovery

  • af William Rowley
    127,95 kr.

    This is a reproduction of a book published before 1923. This book may have occasional imperfections such as missing or blurred pages, poor pictures, errant marks, etc. that were either part of the original artifact, or were introduced by the scanning process. We believe this work is culturally important, and despite the imperfections, have elected to bring it back into print as part of our continuing commitment to the preservation of printed works worldwide. We appreciate your understanding of the imperfections in the preservation process, and hope you enjoy this valuable book. ++++ The below data was compiled from various identification fields in the bibliographic record of this title. This data is provided as an additional tool in helping to ensure edition identification: ++++ A Letter To Dr. William Hunter ... On The Dangerous Tendency Of Medical Vanity William Rowley

  • - Simple Guide on Network Scanning
    af William Rowley
    98,95 kr.

    This book is an excellent guide for you on how to use Nmap 7. The first part of the book guides you on how to get started with Nmap by installing it on the various types of operating systems. You are then guided on how to scan a network for SMB (Server Message Vulnerabilities). This will help you learn how to gather information from a target host. You are also guided on how to scan a network for the open ports. Such ports are an advantage to hackers, as they can allow them to gain unauthorized access into your network. Information encrypted with SSL/TLS encryption is prone to the heartbleed bug. You are guided to test whether your information is vulnerable to this bug. The process of determining the live hosts on a network is also explored in detail. Live hosts can be compromised for an attacker to gain valuable information from such hosts. The process of scanning a network firewall is also examined in detail. This will help you determine the ports which are open. You will also learn the services which have been assigned to the various ports on the firewall. The process of performing layer 2 discoveries with Nmap is explored in detail, thus, you will know how to do it. You are also guided on how to grab banners using Nmap. The process of gathering network information with Nmap as well as penetrating into servers is then discussed.

  • - An Introduction to TOR Network and Online Security: How to stay anonymous in the Internet
    af William Rowley
    98,95 kr.

    Most people usually want to conceal the usage and their location while using the internet. This is what led to the development of the Tor browser as it lets users to browse anonymously. It works by encrypting the data and concealing the IP address of both the source and destination for the traffic. Persons who do network surveillance or traffic analysis will then be unable to trace what you have done with the internet and as well as your location. The browser has gained much popularity, particularly amongst persons who want to ensure the privacy and confidentiality of their internet activity.

  • af William Rowley
    265,95 kr.

    This is a reproduction of a book published before 1923. This book may have occasional imperfections such as missing or blurred pages, poor pictures, errant marks, etc. that were either part of the original artifact, or were introduced by the scanning process. We believe this work is culturally important, and despite the imperfections, have elected to bring it back into print as part of our continuing commitment to the preservation of printed works worldwide. We appreciate your understanding of the imperfections in the preservation process, and hope you enjoy this valuable book. ++++ The below data was compiled from various identification fields in the bibliographic record of this title. This data is provided as an additional tool in helping to ensure edition identification: ++++ Schola Medicinae Universalis Nova. Pars Prior, Continens Historiam Medicinae, Anatomiam, Physiologiam Specialem Cum Plurimis Tabulis Aeneis William Rowley in aedibus auctoris, 1794

  • af William Rowley
    127,95 kr.

    This is a reproduction of a book published before 1923. This book may have occasional imperfections such as missing or blurred pages, poor pictures, errant marks, etc. that were either part of the original artifact, or were introduced by the scanning process. We believe this work is culturally important, and despite the imperfections, have elected to bring it back into print as part of our continuing commitment to the preservation of printed works worldwide. We appreciate your understanding of the imperfections in the preservation process, and hope you enjoy this valuable book. ++++ The below data was compiled from various identification fields in the bibliographic record of this title. This data is provided as an additional tool in helping to ensure edition identification: ++++ An Essay On The Cure Of The Gonorhoea, Or Fresh Contracted Venereal Infection Without The Use Of Internal Medicines William Rowley printed for F. Newbery, 1771 Medical; Infectious Diseases; Medical / Infectious Diseases

  • - With Improvements in the Methods of Cure
    af William Rowley
    142,95 kr.

    This is a reproduction of a book published before 1923. This book may have occasional imperfections such as missing or blurred pages, poor pictures, errant marks, etc. that were either part of the original artifact, or were introduced by the scanning process. We believe this work is culturally important, and despite the imperfections, have elected to bring it back into print as part of our continuing commitment to the preservation of printed works worldwide. We appreciate your understanding of the imperfections in the preservation process, and hope you enjoy this valuable book. ++++ The below data was compiled from various identification fields in the bibliographic record of this title. This data is provided as an additional tool in helping to ensure edition identification: ++++ An Essay On The Ophthalmia Or Inflammation Of The Eyes And The Diseases Of The Transparent Cornea: With Improvements In The Methods Of Cure William Rowley printed for Francis Newbery, 1771

  • af William Rowley
    139,95 kr.

    This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

  • af William Rowley
    180,95 kr.

    This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

  • af William Rowley
    158,95 kr.

    This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

  • af William Rowley
    314,95 kr.

    This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.