|
|
|
|
|
Shellcoder's Programming UncoveredSome software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.
How hackers, viruses, and worms attack computers from the Internet and exploit security holes... | | Social eCommerce: Increasing Sales and Extending Brand Reach
Want to make money online? Then ignore social media at your own risk. Social media is vital if you want to your business to thrive, and though you can’t control the conversations, you can influence them. This book will teach you how.
If mismanaged, social media can create more noise than signal. It can be a time... | | Linux Mint Essentials
A practical guide to Linux Mint for the novice to the professional
About This Book
-
Learn to use Linux Mint like a pro, starting with the installation and going all the way through maintaining your system
-
Covers everything you need to know in order to be productive, including browsing the...
|
|
|
SAS Storage Architecture: Serial Attached SCSI
The SAS Storage Architecture book is intended as a tutorial and to serve as
classroom materials for the training MindShare delivers on this subject. It
should be considered a companion to the SAS standard, helping to clarify and
explain the concepts and provide the motivation for decisions that were made
in the creation of the... | | | | Broadband Internet: Access, Regulation and PolicyThe internet has become so widespread that such issues as access, regulation and related policies have become major factors in the economy and social fabric of societies in every part of the world. Peoples without running water are demanding access to the internet and those without it are becoming deprived citizens. This new book examines current... |
|
|
Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 |