Home | Amazing | Today | Tags | Publishers | Years | Search 
Mobile Malware Attacks and Defense
Mobile Malware Attacks and Defense
The Only Book for Analyzing and Mitigating Mobile Malicious Code!

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new
...
Sams Teach Yourself Networking in 24 Hours (3rd Edition)
Sams Teach Yourself Networking in 24 Hours (3rd Edition)
You can't go too far in technology these days without at least a casual understanding of data communications over local and wide-area networks (LANs and WANs). Sams Teach Yourself Networking in 24 Hours will clue you in on the seven-layer Open Systems Interconnect (OSI) networking abstraction and other key facts and concepts having to do...
Quicken 2009 For Dummies (Computer/Tech)
Quicken 2009 For Dummies (Computer/Tech)
If just thinking about financial management gives you a headache, personal finance software is better than aspirin. Quicken is tops, and Quicken 2009 For Dummies is the quickest and easiest way to put it to work.

Here’s the plain-English guide to using the newest update of the nation’s leading personal finance software....

Social Computing in Homeland Security: Disaster Promulgation and Response (Premier Reference Source)
Social Computing in Homeland Security: Disaster Promulgation and Response (Premier Reference Source)
The sequence of major events that occurred after entering the twenty-first century have all pointed to an effective emergency response as one of the most complex challenges many countries now face.

Social Computing in Homeland Security: Disaster Promulgation and Response presents a theoretical framework addressing how to...

Computer Security Handbook
Computer Security Handbook

The definitive formula for computer security, from power outages to theft and sabotage

Whether you are in charge of many computers, or even one important one, there are immediate steps you can take to safeguard your company’s computer system and its contents. The Computer Security Handbook provides a readable and...

Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for...
Identity Theft Handbook: Detection, Prevention, and Security
Identity Theft Handbook: Detection, Prevention, and Security
The magnitude of the identity theft and fraud problem is enormous. Identity fraud was identified as one of the top priorities of the Department of Justice, just prior to the terrorist attacks of 9/11. Naturally, everyone’s priorities changed after 9/11. The impact of identity theft and identity fraud is reaching a proportion and a level of...
Sams Teach Yourself Networking in 24 Hours (4th Edition)
Sams Teach Yourself Networking in 24 Hours (4th Edition)
In just 24 sessions of one hour or less, learn how to use today’s key networking techniques and technologies to build, secure, and troubleshoot both wired and wireless networks. Using this book’s straightforward, step-by-step approach, you master every skill you need—from working with Ethernet and Bluetooth to spam prevention to...
Pro Excel Financial Modeling: Building Models for Technology Startups
Pro Excel Financial Modeling: Building Models for Technology Startups
Learn the business thinking behind financial modeling and execute what you know effectively using Microsoft Excel. Many believe that sales and profitability projections shown in financial models are the keys to success in attracting investors. The truth is that investors will come up with their own projections. The investor wants to understand the...
Principles of Transaction Processing, Second Edition (The Morgan Kaufmann Series in Data Management Systems)
Principles of Transaction Processing, Second Edition (The Morgan Kaufmann Series in Data Management Systems)

This book offers a clear, concise guide for anyone involved in developing applications, evaluating products, designing systems, managing databases, or engineering products. It provides an understanding of the internals of transaction processing systems, describing how they work and how best to use them. It includes the architecture of...

Using the Internet Safely For Seniors For Dummies (Computer/Tech)
Using the Internet Safely For Seniors For Dummies (Computer/Tech)
The Internet is amazing, but the risks you’ve heard about are real, too. You can avoid being a victim of online crime with the simple steps for staying safe online that you’ll find in Using the Internet Safely For Seniors For Dummies.

Here’s the guide you need to steer safely through the hazards so you can shop,...

Algorithms of the Intelligent Web
Algorithms of the Intelligent Web
Web 2.0 applications provide a rich user experience, but the parts you can't see are just as important-and impressive. They use powerful techniques to process information intelligently and offer features based on patterns and relationships in data. Algorithms of the Intelligent Web shows readers how to use the same techniques employed by...
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy