Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacker Attack

Buy
Hacker Attack, 9780782128307 (0782128300), Sybex, 2000
Hacker Attack is the only book about computer security that is at once entertaining, understandable, and practical. You'll be fascinated as you read about hackers, crackers and whackers--people who spend their time trying to break into your computer, spreading computer viruses, or peeping (and recording what they see!) as you surf the Internet or send email.

Best of all, this book provides simple but powerful solutions to all these security needs. It's all on the book's CD. Protect yourself right now with firewalls, anonymisers, and virus-guards. This is without doubt the most readable and interesting book about computer security ever written. You'll enjoy reading it, and you'll be safe after you've followed its advice.

(HTML tags aren't allowed.)

Violence at Sea: Piracy in the Age of Global Terrorism
Violence at Sea: Piracy in the Age of Global Terrorism
Violence at Sea is an overview of maritime piracy, examining threats that piracy poses to global security and commerce, as well as measures and policies to mitigate the threat. The essays analyze piracy activities in key shipping lanes (including the African coast, the Arabian Sea, the Bay of Bengal, and the Straits of Malacca-South China...
CEH v9: Certified Ethical Hacker Version 9 Practice Tests
CEH v9: Certified Ethical Hacker Version 9 Practice Tests

Master CEH v9 and identify your weak spots

CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain...

Fearless Interviewing: How to Win the Job by Communicating with Confidence
Fearless Interviewing: How to Win the Job by Communicating with Confidence
A proactive new strategy for removing anxiety, and regaining control, throughout the job interview process

"Marky Stein's book is wonderful. She gives us a thorough analysis of the whole interviewing process. Fearless Interviewing is clear, kind, and full of good advice.... Highly...


Mastering Virtual Machine Manager 2008 R2
Mastering Virtual Machine Manager 2008 R2

One-of-a-kind guide from Microsoft insiders on Virtual Machine Manager 2008 R2!

What better way to learn VMM 2008 R2 than from the high-powered Microsoft program managers themselves? This stellar author team takes you under the hood of VMM 2008 R2, providing intermediate and advanced coverage of all features.

Universal Serial Bus System Architecture (PC System Architecture Series)
Universal Serial Bus System Architecture (PC System Architecture Series)
Universal Serial Bus System Architecture provides an in-depth discussion of USB and is based on the 1.0 version of the Universal Serial Bus specification. It focuses on the USB protocol, signaling environment, and electrical specifications, along with the hardware/software interaction required to configure and access USB devices. Although this...
JUNOS Security
JUNOS Security

Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy