You've requested...

Share this with your colleagues:

Download this next:

Windows 8 Secrets

 

By Paul Thurrott & Rafael Riverra

 

Microsoft is introducing a major new release of its Windows operating system, Windows 8, and what better way for you to learn all the ins and outs than from two internationally recognized Windows experts and Microsoft insiders, authors Paul Thurrott and Rafael Rivera?

 

They cut through the hype to get at useful information you'll not find anywhere else, including what role this new OS plays in a mobile and tablet world.

 

This extract for Computer Weekly readers takes readers through the basics of installing Windows 8.

 

Contents:

 

  • Using the Windows 8 Web Installer
  • Step-by-Step: Installing Windows 8

This is an extract from the book:

Windows 8 Secrets

By Paul Thurrott & Rafael Riverra

Published by Wiley

£26.99

 

Download includes a 30% Discount Code for Computer Weekly Members

 


Click on the button below to download this extract and to obtain an exclusive discount code.

 

These are also closely related to: ""

  • How IoT is changing the Tour de France

    When watching sports on television you are consistently confronted with a barrage of data meant to give the viewer insight into the most complicated inner workings of football, tennis, cricket, etc. This has never been the case, however, in cycling, where a viewer watching the Tour de France knows only the time differences between various riders and the peloton.

    Access this week’s ComputerWeekly to learn about the team that is bringing IoT to the Tour de France, the race insights we will now have, the challenges faced in providing this data, and more.

  • Computer Weekly – 19 November 2013: Software-defined networking explodes

    Computer Weekly – 19 November 2013: Software defined networking explodes

    In this week’s Computer Weekly, we look at how startups are stimulating the networking market and how the public sector is facing up to BYOD hurdles. Experience contributor Adrian Bridgwater also brings you our Buyer’s Guide to testing and code quality before we assess video and voice communication options in web browsers.

    Open source collaboration drives networks innovation

    The OpenDaylight project has attracted attention from across the networking industry as software-defined networking gathers interest. Find out why.

    Public sector faces stiff regulatory hurdles in rolling out BYOD projects

    The government has issued challenging guidelines for local councils planning to implement bring your own device (BYOD) schemes and we look at the impact this could have.

    Interview: No room for error in travel services

    Head of global operations Wolfgang Krips tells Cliff Saran how Amadeus ensures its global distribution system is operational 24/7, without fail.

    Buyer’s Guide to testing and code quality

    Developers have adopted agile methods to keep up with the pace of the market, but how can they ensure code stays in good shape? Adrian Bridgwater shares lessons learnt.

    Real-time video communication on a browser without plugins

    Skype, Google+ and other IM services either aren’t up to scratch or face compatibility issues across many businesses but could WebRT be the answer?

    Opinion: Amended Data Protection Regulation could introduce fines up to €100m

    Changes to the European Data Protection Regulation will have far-reaching consequences for businesses across all industries. Discover where you need to tighten up.

Find more content like what you just read:

  • CW ANZ September 2016

    Few organisations invest heavily in IT to make sure their clients use less of their product, but that's the battle Australia's National Blood Authority (NBA) is fighting – and winning.

    Download

  • Discover how data analytics and IoT work together to transform the IT industry

    In this week's Computer Weekly, our UK salary survey shows that IT leaders are benefiting from generous bonuses as tech becomes part of mainstream business. We find out how the internet of things is transforming the railway industry. And the CIO of the Williams F1 team explains how data analytics is boosting race performance. Read the issue now.

    Download

  • Modernizing legacy applications saves bottom lines

    Since their legacy Lotus Notes environment was going to shutdown, which included over 200 custom apps, one company took a group of workers that had been developing ITIL and service management modules for years and transitioned them into a team that builds custom apps. Find out the benefits they realized from this process.

    Download

  • How to automate business processes with a single, unified platform

    Find out how to reduce your reliance on manual business processes, and discover how to easily connect workflows – regardless of whether they stem from CRM, ERP, Salesforce, SharePoint, HR, or even legacy systems.

    Download

  • Overcoming common DCIM challanges and limitations

    This expert e-guide offers information on how data center infrastructure management tools can benefit your organization. It also offers information on how to overcome the limitations of DCIM. Access now to gain insight into topics like:using DCIM tools for energy management, DCIM challenges and limitations and more.

    Download

  • Top 10 Predictions for 2013

    Analyst Group, Nucleus Research gives its view of the IT trends and technologies that will shape 2013.

    Download

  • How to protect industrial IoT assets from cyberattacks

    Learn how to stop cyberthreats before they can damage critical industrial assets and systems by going inside one cyberattack launched against energy organization Consolidated Power. See how they used an industrial cyber protection platform and uncover 4 considerations for IIoT security.

    Download

  • 5 decisions to make before starting a XenDesktop Service trial in the cloud

    Use the following resource to prepare for your XenApp and XenDesktop Service trial on Citrix Cloud. Included inside is a breakdown of five key decisions to make before starting your trial, sample architecture for how to set up an on-premises environment for Citrix Cloud, and more.

    Download

  • How to combat the changing cryptocurrency landscape in 2018

    In this white paper, discover the most common methods used by criminal actors, including account takeovers, mining fraud and scams against initial coin offerings (ICOs). Then, learn how to update your security infrastructure to combat the changing cryptocurrency landscape in 2018.

    Download

  • Secure texting strategies for transmitting PHI

    In this handbook, our health IT experts closely examine the benefits of virtual desktop infrastructures in healthcare. Access now for advice on you can avoid the common virtualization installation traps, plus 5 reasons you should consider desktop virtualization for your healthcare organization.

    Download

  • 3 key factors that drive next-gen data centers

    Access this white paper to learn how IT organizations are adopting software-defined data centers to stay relevant in the era of public clouds.

    Download

  • Computer Weekly – 3 October 2017: Digitally preserving history

    In this week's Computer Weekly, we find out how cloud technologies are helping Gibraltar to digitally preserve historic documents and safeguard its cultural heritage. We examine progress on the roll-out of the new NHS national network. And our latest buyer's guide looks at cloud-based ERP software. Read the issue now.

    Download

  • Tablets & Smartphones in the Enterprise

    Frantic IT departments are being forced to manage BYOD on the fly. Read this white paper to get strategic, practical advice on how to manage this consumer-driven trend.

    Download

  • Tablets and Smartphones in the Enterprise

    This expert ebook takes an in-depth look at the BYOD trend, its impact on business and IT, and what your organization can do to ensure its success in your environment.

    Download

  • Mobile phone app opportunities for business

    Over the past 12 months, the global market for applications – fuelled by the astonishing and unprecedented activity experienced on Apple’s App Store and iPhone – has continued its stellar levels of growth.

    Download

  • Step-by-step Guide to Migrating from Exchange 2003 to Exchange 2010

    While Exchange 2010 promises to offer enhanced communication and collaboration capabilities, the migration process can still be a challenge for even the most diligent IT professional. Take a look at this e-book from the editors at SearchExchange.com for a top-to-bottom, expert analysis of the Exchange migration process.

    Download

  • CW Buyer's Guide: Consumerisation

    This guide to consumerisation of IT condsiders what the proliferation of consumer technology in the workplace means for the IT department and how it can empower employees to boost resourcefulness and productivity.

    Download

  • How to install SAP HANA on Azure large instance servers

    Even after you've made the decision to deploy SAP HANA on Azure large instances, you may still need help with the steps of the installation process. Uncover step-by-step advice (with screen shots) on how to install HANA on Azure large instance serves to help smooth over your implementation.

    Download

  • Applied Desktop Virtualisation

    This analyst report from Freeform Dynamics gives helpful advice for companies embarking on Desktop Virtualisation projects.

    Download

  • Computer Weekly datacentre case studies

    Jim Mortleman takes a look at what made the winning entries stand out from the crowd in the Computer Weekly European User Awards.

    Download

  • Musings on datacentres

    Analyst Clive Longbottom discusses the key issues in managing and designing data centres.

    Download

  • E-Book: New Enterprise Desktop Chapter 3: Windows 7 Security: Strengths and Weaknesses

    Each new OS is touted as the “Holy Grail” of features that every IT pro has been waiting for. Windows 7 is no different. This chapter looks at the Windows 7 security features such as BitLocker and Action Center, and separates those that really count from those that sound better on paper.

    Download

  • 802.11ac wireless: Buyer's guide

    802.11ac Wave 2 wireless is the critical component in handling the ever increasing demand for more bandwidth, however the entire network must be considered for an exceptional wireless outcome. This guide is designed to help you make better decisions before purchasing and deploying 802.11ac Wave 2.

    Download

  • BT rolls out Microsoft Sharepoint 2010

    BT is to roll out Facebook-style social networking services to its 100,000 employees, in a move it says will help staff collaborate more effectively on projects, whether they are in the office or working remotely.

    Download

  • How VDI fits into your enterprise and top benefits that help sell this technology

    Virtual desktop infrastructures simplify desktop management and reduce the typical issues faced when dealing with distributed desktops. Receive expert advice on top virtual desktop benefits and learn how VDI fits into your enterprise today.

    Download

  • How to overcome 3 key healthcare VDI issues

    Desktop virtualization attracts clinicians and health IT professionals alike with time savings and technological streamlining. This exclusive handbook takes a look at three added issues about virtualization in healthcare settings – performance, caregiving, and hyper-convergence.

    Download

  • Raspberry PI with Java: programming the internet of things

    In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.

    Download

  • Exchange Insider E-Zine vol. 11: Office 365, mobile devices, Exchange security

    In this edition of the Exchange Insider E-Zine, explore how to migrate to Office 365, support mobile devices and protect your Exchange Server environment from the latest threats.

    Download

  • A Computer Weekly buyer's guide to expense management

    Every year, UK businesses deal with about £10bn in expenses claims, but surprisingly few use IT to manage that spend. In this 12-page buyer's guide, Computer Weekly looks at how the application of expense management tools can reward organisations with immediate cost and time savings

    Download

  • Backup & replication using AWS VTL gateway deployment guide

    For many enterprises, long-term retention of backups is costly and time consuming. Access this step-by-step guide for a walk through of using AWS as a gateway in VTL mode to send archival backups to the public cloud. Included are steps for planning, installation, configuration, and more.

    Download

  • E-Guide: How to Determine if VDI is Right for your Company and Ways to Overcome Common Annoyances

    Even though the thought of virtual desktops has caught everyone's attention, the actual number of installations remains small. This expert e-guide from SearchVirtualDesktop.com explains how organizations can determine whether this technology is right for them by calculating the return on investment from VDI.

    Download

  • 2017 security report: Attacker behavior, vulnerabilities, and beyond

    Security teams are faced with protecting their companies' key assets from a constantly evolving threat landscape – making it imperative to stay on the pulse of cybersecurity. Explore this report to learn about current attacker behaviors, trends in vulnerability management, evolutions in malware, and beyond.

    Download

  • Technology, media and telecommunications predictions 2017

    Deloitte predicts the key trends in technology, media and telecommunications in 2017

    Download

  • Social, mobile, analytics, and cloud: IT challenges in Asean nations

    An increasingly tech-savvy Asean population, especially among the younger, more urban demographics, is driving IT teams to look at challenges in a new way. In this e-zine, explore the obstacles facing IT in Asean nations and markets. Find out what upcoming changes will have the greatest impact on users, IT resources, and revenue.

    Download

  • Powering the data centre

    A look at alternative approaches to managing energy for cost and/or sustainability reasons in data centres.

    Download

  • Your guide to a successful data center cooling monitoring system

    This expert handbook explains how to set up a data center cooling monitoring system, while looking at how increasing server inlet temperatures can optimize cooling efficiency and outlines methods for building hot-aisle/cold-aisle containment systems. Lastly, explore detailed criteria for selecting and implementing economizers in your data center.

    Download

  • CW Buyers Guide: Cloud Storage

    Computer Weekly looks at the variety of cloud storage options for the enterprise, their benefits and the potential security risks and opportunity costs they present.

    Download

  • CW Buyer's Guide: Desktop virtualisation

    This eight-page buyer's guide looks at desktop virtualisation and identifies some of the options IT directors must consider when planning a virtualisation project.

    Download

  • CW Special Report on Microsoft

    This 12 page special report updated for 2012 gives you the facts on Microsoft, its strategy, products and services and financial performance.

    Download

  • 3 ITSM roadblocks and how to avoid them

    Access this infographic to learn the 3 most common roadblocks harming IT service management systems, and how you can avoid them at your organization.

    Download

  • Unified app management: Where are we now?

    This white paper looks to enterprise mobility management (EMM) as the primary means of securing and managing enterprise devices during the evolution of operating systems.

    Download

  • CW ASEAN September 2016

    Increasingly, companies in the Southeast Asia are embracing the cloud by putting their business applications there.

    Download

  • CW Special report on Symantec

    This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy.

    Download

  • How to ensure HIPAA compliance for containerized apps

    With the advent of microservices it is likely that many new healthcare apps are being built with containers. Discover how to achieve compliance with the HIPAA Security Rule for containerized workloads for healthcare apps.

    Download

  • Cloud services: Total economic benefits assessment guide

    By now, everyone knows that the cloud is a strong option because of its cost benefit. But have you ever done an exact breakdown to see where the savings happen? This paper provides economic comparisons between perpetually licensed software, and newer cloud service equivalents.

    Download

  • A special issue covering the opportunities in mobility market

    A special issue covering the opportunities for resellers selling mobility hardware, supporting infrastructure and management tools

    Download

  • Virtual Data Center E-Zine: Volume 39: Managing Virtualization Patches

    Keeping all of your patches up-to-date is a tedious but necessary task in order to ensure a fully protected data center. This dedicated e-zine highlights tips and strategies for making patch management easier and less time-consuming.

    Download