Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Recently, while driving to my work, I listened to radio as usual. Because of the establishment of the new EU (European Union) domain, there was an interview with a representative of one of the Internet Service Providers. For some time the interview went on, boringly similar to other common radio interviews, but suddenly the presswoman started to...
Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise
Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise

Is someone waiting to pick off your BlackBerry?

Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker.

Traditionally, security for mobile devices—which are essentially...

Principles of Cybercrime
Principles of Cybercrime

We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually every...

Explorations in Quantum Computing (Texts in Computer Science)
Explorations in Quantum Computing (Texts in Computer Science)

In the decade since the publication of the first edition of “Explorations in Quantum Computing” the field has blossomed into a rich and diverse body of knowledge, and tremendous progress has been made on building functional quantum computer hardware. Yet I find that a discussion of applications of quantum computers still remains...

DVD Studio Pro 4
DVD Studio Pro 4
A private DVD authoring tutorial, from one of the world's top trainers
Bruce Nazarian, "the DVD Guy," travels the world, teaching both home users and media professionals how to make world-class DVDs, using Macintosh computers with DVD Studio Pro and the Superdrive. But now you don't have to wait for one of his
...
Knowledge-Based Virtual Education: User-Centred Paradigms
Knowledge-Based Virtual Education: User-Centred Paradigms
Virtual learning plays an important role in providing academicians, educators and students alike, with advanced learning experiences. At the forefront of these current technologies are knowledge-based systems that assess the environment in which such learning will occur and are adaptive by nature to the individual needs of the user (Grossman et...
Security and Privacy in Mobile Information and Communication Systems
Security and Privacy in Mobile Information and Communication Systems

MobiSec was the second ICST conference on security and privacy for mobile information and communication systems. It was held in front of the beautiful historic backdrop of Catania, the Sicilian town with marvelous views of Mt. Etna. The never fully dormant volcano provided appropriate scenery, metaphorically relating to the security threats...

Security and Privacy for Microsoft Office 2010 Users
Security and Privacy for Microsoft Office 2010 Users
SECURITY AND PRIVACY issues with computers and computer networks are constantly in the news these days, and everyone seems to be concerned about them to some degree. Businesses everywhere are worried about having sensitive customer information such as credit card numbers or email addresses stolen,...
Microsoft Windows Operating System Essentials
Microsoft Windows Operating System Essentials

A full-color guide to key Windows 7 administration concepts and topics

Windows 7 is the leading desktop software, yet it can be a difficult concept to grasp, especially for those new to the field of IT. Microsoft Windows Operating System Essentials is an ideal resource for anyone new to computer administration and...

Windows 10 Anniversary Update Bible
Windows 10 Anniversary Update Bible

Your all-inclusive guide to Windows 10 Anniversary Edition

Windows 10 Bible, Anniversary Update presents the ultimate reference for enterprise and professional Windows 10 Anniversary Update users. From setup and settings to networking and the daily workflow, this book provides expert guidance on all aspects of the OS....

Algorithms
Algorithms
This book is intended to survey the most important algorithms in use on
computers today and to teach fundamental techniques to the growing number
of people who are interested in becoming serious computer users. It is appropriate
for use as a textbook for a second, third or fourth course in computer
science: after students have
...
Linux® Patch Management: Keeping Linux® Systems Up To Date
Linux® Patch Management: Keeping Linux® Systems Up To Date

The Start-to-Finish Patch Management Guide for Every Linux® Environment

To keep your Linux systems secure, reliable, and productive, you must stay current with patches and updates. But, until now, it has been difficult to find usable,...

unlimited object storage image
Result Page: 153 152 151 150 149 148 147 146 145 144 143 142 141 140 139 138 137 136 135 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy