Home | Amazing | Today | Tags | Publishers | Years | Search 
Master VISUALLY Microsoft Windows Vista
Master VISUALLY Microsoft Windows Vista
"One picture is worth a thousand words." If you prefer instructions that show you how rather than tell you why, then this intermediate to advanced level reference is for you. Hundreds of succinctly captioned, step-by-step screen shots reveal how to accomplish more than 200 Windows Vista tasks, including:
  • Handling new,...
Malicious Mobile Code: Virus Protection for Windows (O'Reilly Computer Security)
Malicious Mobile Code: Virus Protection for Windows (O'Reilly Computer Security)

Here are some sure things: you can't get a virus by simply reading an email. Malicious code can't harm hardware. A virus can't hide from a booted, write-protected diskette. Your computer can't get infected from a picture file. I have given this advice hundreds of times and could repeat it in my sleep. It was the mantra of every...

CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

Shellcoder's Programming Uncovered
Shellcoder's Programming Uncovered
Some software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.

How hackers, viruses, and worms attack computers from the Internet and exploit security holes
...
Buying a Computer for Dummies, 2005 Edition
Buying a Computer for Dummies, 2005 Edition
CPU, Ghz, Mhz, DIMMS, RAM, ROM, AGP, ISA, PCI, USB, CRT, LCD, NIC, CCD, CIS, DP, Kbps. What do all of these acronyms mean?

Are you baffled by computer technology and technology? Intimidated by computer salespeople who grimace or grin when you say “gizmo?” Buying a Computer For Dummies 2005 Edition gives you the ABCs of...

Windows Vista All-in-One Desk Reference For Dummies (Computer/Tech)
Windows Vista All-in-One Desk Reference For Dummies (Computer/Tech)
9 books in 1—your key to Windows Vista survival!

Your one-stop guide to new Vista features, video, music, networks, cool hardware, and more

Tame and tease Vista's new features with the expert advice in these handy minibooks. From gadgets to glass, desktops to downloads, backups to...

Endpoint Security
Endpoint Security
This book makes the assumption that if we've been doing the same thing for years and we continue to fail then we must be doing something wrong. Some basic assumption about what we're doing and why we're doing it is incorrect. Yes, incorrect. But we continue to behave as if nothing is wrong. The pain is there but now the problem is that...
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Security is a broad topic that is only becoming broader as we become more reliant on computers for everything we do, from work to home to leisure, and our computers become more and more interconnected. Most of our computing experiences now require, or are enriched by, Internet connections, which means our systems are constantly exposed to foreign...
Computer Viruses For Dummies
Computer Viruses For Dummies

Build up your defenses against online germ warfare

Discover how viruses work and how to outsmart the cyber-thugs who create them

Viruses, worms, and Trojan horses create a serious health problem for your PC, but this handy little book has the antidote! It’ll help you exterminate those nasty bugs and protect your...

PC Magazine - 21 August 2007
PC Magazine - 21 August 2007
First Looks
GoToMeeting v3.0
GuardedID 1.02
Howard Verity TW3
Kodak EasyShare 5300 All-In-One printer
Logitech X-240
MSI Q677 Crystal Edition
Nokia E61i
Oki Printing Solutions C6000n
Panasonic Lumix DMC-FZ8
RealPlayer 11 (beta)
Sennheiser PXC 450 NoiseGard
Sony VAIO VGN-SZ370P
Adobe
...
OS X Exploits and Defense
OS X Exploits and Defense
Long believed to be a sanctuary of computer security, the Macintosh OS X operating system is increasingly under fire, making it as vulnerable to attack as Windows or Linux operating systems.

Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an
...
Always Use Protection: A Teen's Guide to Safe Computing
Always Use Protection: A Teen's Guide to Safe Computing
Dan Appleman's career is typical of someone who, unable to choose what he wants to do for a living, decides to do everything. From founding a software company (Desaware), to cofounding a publishing company (Apress), to programming, to writing books (this is his seventh), he's a Brm believer that the question 'What do...
Result Page: 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy