Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
PCs: The Missing Manual
PCs: The Missing Manual

Your vacuum comes with one. Even your blender comes with one. But your PC--something that costs a whole lot more and is likely to be used daily and for tasks of far greater importance and complexity--doesn't come with a printed manual. Thankfully, that's not a problem any longer: PCs: The Missing...

CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Technological Turf Wars: A Case Study of the Computer Antivirus Industry
Technological Turf Wars: A Case Study of the Computer Antivirus Industry
Computer security is a technical and social problem. It is just as much about social relationships as it is about computers as tools. Internet security professionals are as concerned with how people use information as they are with how machines manipulate and process that information. This book is a case study of how the knowledge systems...
Always Use Protection: A Teen's Guide to Safe Computing
Always Use Protection: A Teen's Guide to Safe Computing
Dan Appleman's career is typical of someone who, unable to choose what he wants to do for a living, decides to do everything. From founding a software company (Desaware), to cofounding a publishing company (Apress), to programming, to writing books (this is his seventh), he's a Brm believer that the question 'What do...
Buying a Computer for Dummies, 2005 Edition
Buying a Computer for Dummies, 2005 Edition
CPU, Ghz, Mhz, DIMMS, RAM, ROM, AGP, ISA, PCI, USB, CRT, LCD, NIC, CCD, CIS, DP, Kbps. What do all of these acronyms mean?

Are you baffled by computer technology and technology? Intimidated by computer salespeople who grimace or grin when you say “gizmo?” Buying a Computer For Dummies 2005 Edition gives you the ABCs of...

The Hacker Playbook: Practical Guide To Penetration Testing
The Hacker Playbook: Practical Guide To Penetration Testing

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the...

Computer Viruses: from theory to applications (Collection IRIS)
Computer Viruses: from theory to applications (Collection IRIS)
This book deals with computer viruses envisaged from three different points of view, namely the theoretical fundamentals of computer virology, algorithmic and practical aspects of viruses and their potential applications to various areas. The theoretical formalization by means of Turing machines, self-reproducing automata and recursive functions...
Technological Turf Wars: A Case Study of the Antivirus Industry
Technological Turf Wars: A Case Study of the Antivirus Industry

In Technological Turf Wars, Jessica Johnston analyzes the tensions and political dilemmas that coexist in the interrelationship among science, technology and society. Illustrating how computer security is as concerned with social relationships as it is with technology, Johnston provides an illuminating ethnography that...

AVIEN Malware Defense Guide for the Enterprise
AVIEN Malware Defense Guide for the Enterprise
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected...
The Art of Computer Virus Research and Defense
The Art of Computer Virus Research and Defense

Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly...

Master VISUALLY Microsoft Windows Vista
Master VISUALLY Microsoft Windows Vista
"One picture is worth a thousand words." If you prefer instructions that show you how rather than tell you why, then this intermediate to advanced level reference is for you. Hundreds of succinctly captioned, step-by-step screen shots reveal how to accomplish more than 200 Windows Vista tasks, including:
  • Handling new,...
unlimited object storage image
Result Page: 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy