Home | Amazing | Today | Tags | Publishers | Years | Search 
Firewalls for Dummies, Second Edition
Firewalls for Dummies, Second Edition
Guard your DSL and protect your personal information

Keep your network safe from viruses, saboteurs, eavesdroppers, and other bad guys

We don’t want to scare you, but "they" are out there! Don’t venture into lawless cyberspace without this trusty guide. It’ll help you evaluate the danger, understand how...

Tech Terms, Third Edition: What Every Telecommunications and Digital Media Professional Should Know
Tech Terms, Third Edition: What Every Telecommunications and Digital Media Professional Should Know
The purpose of this book is to provide telecommunications and digital media professionals with a collection of must-know terms and concepts that are likely to pop up in their daily conversations or appear in news articles or informational media that address our increasingly technological world. It is also intended for anyone who simply wants to...
Digital Crime And Forensic Science in Cyberspace
Digital Crime And Forensic Science in Cyberspace
itself. Forensics—the process, means, and methods for collecting crime evidence—can be said to date back to the 18th century stemming from forensic medicine and studies of anatomy and fingerprints. Crime manifests itself in various ways and forms and digital crime is the newest one. As the essence of the various forms of crime has...
How the Internet Works (8th Edition)
How the Internet Works (8th Edition)
Have you ever wanted to know how data travels from computer to computer, around the world? Have you ever wondered how Web sites can track users or how newsgroups work? How the Internet Works shows you how with easy-to-follow, four-color visual spreads tracking the path data flows and the hardware involved. Now entering its fourth year, How the...
How to Be Invisible: The Essential Guide to Protecting Your Personal Privacy, Your Assets, and Your Life (Revised Edition)
How to Be Invisible: The Essential Guide to Protecting Your Personal Privacy, Your Assets, and Your Life (Revised Edition)
From cyberspace to crawl spaces, new innovations in information gathering have left the private life of the average person open to scrutiny, and worse, exploitation. In this thoroughly revised update of his immensely popular guide How to Be Invisible, J.J. Luna shows you how to protect yourself from these information predators by securing your...
Computer Network Security
Computer Network Security
A comprehensive survey of computer network security concepts, methods, and practices. This authoritative volume provides an optimal description of the principles and applications of computer network security in particular, and cyberspace security in general. The book is thematically divided into three segments: Part I describes the operation and...
Strategic Planning for Information Systems
Strategic Planning for Information Systems
Since the second edition of this book appeared in 1996, we have seen
Information Technology (IT) become an increasingly integral component
of everyone’s working life and personal environment. IT is now
ubiquitous and enables a degree of connectivity that was difficult to
envisage even 10 years ago. The technology has
...
Data and Applications Security XVII: Status and Prospects
Data and Applications Security XVII: Status and Prospects
Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its convergence with telecommunication networks are providing incredible connectivity, myriad applications and, of course, new...
Intellectual Property Rights in a Networked World: Theory and Practice
Intellectual Property Rights in a Networked World: Theory and Practice
Intellectual Property Rights in a Networked World is a collection of recent essays offering fresh perspectives on the scope and future of intellectual property rights. The tripartite division of the book is designed to make this inter-disciplinary topic more accessible and intelligible to readers of diverse backgrounds. Part I consists of a single...
The Internet: The Missing Manual
The Internet: The Missing Manual

The Internet is almost synonymous with change--that's one of its charms, and one of its headaches. You may think you know the Internet, but are you really up to speed on internet telephones, movie and TV downloading, blogging, gaming, online banking, dating, and photosharing?

This utterly current book...

Code: Version 2.0
Code: Version 2.0
The "alarming and impassioned"* book on how the Internet is redefining constitutional law, now reissued as the first popular book revised online by its readers (*New York Times)

There's a common belief that cyberspace cannot be regulated-that it is, in its very essence, immune from the government's (or anyone else's)...

25 Things to Make and Do in Adobe Photoshop Elements 4
25 Things to Make and Do in Adobe Photoshop Elements 4

Are your photos getting lost in the cyberspace of your hard drive? 25 Things to Make and Do in Photoshop Elements 4 shows you how to instantly arrange all your photos by date, event, place, or subject for easy viewing, and then...

Result Page: 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy