|
|
|
|
How Personal & Internet Security Works (How It Works)In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft... | | Ubuntu 7.10 Linux Unleashed, 3rd EditionWelcome to Ubuntu 7.10 Linux Unleashed! This book covers the free Linux distribution named Ubuntu and includes a fully functional and complete operating system produced by the Ubuntu Community, sponsored by Canonical Software.
Ubuntu directly descends from one of the oldest and most revered Linux distributions ever: Debian. Those of you... | | The Internet: The Missing ManualThe Internet is almost synonymous with change--that's one of its charms, and one of its headaches. You may think you know the Internet, but are you really up to speed on internet telephones, movie and TV downloading, blogging, gaming, online banking, dating, and photosharing?
This utterly current book... |
|
| | Beginning PL/SQL: From Novice to ProfessionalThis is a book about writing stored procedures for an Oracle database. A stored procedure in this context is a generic term for a program written in the Procedure Language extension for SQL (PL/SQL) that is stored inside the database when it is compiled. This means that you can then execute the program from inside the database. Why would you want... | | Photographs from the Edge of Reality: True Stories About Shooting on Location, Surviving, and Learning Along the Way
As I traveled around the world as a photographer, it quickly became apparent that stories such as, “I was stuck on an overnight train, sleep deprived, en route to Warsaw, Poland, as border guards were demanding my travel documents at 4 a.m. in a language I didn’t understand…,” or, “I found myself celebrating the... |
|
The Tech-Savvy Real Estate AgentSure, you know how to use the MLS database, but do you know how to effectively establish a Web presence or do customer outreach via email or the Web? There are all kinds of ways you can use technology to market your practice and service your clients, but if you're like most realtors you've probably only scratched the surface. In... | | Hardening Cisco Routers (O'Reilly Networking)
Master one single topic, and everything becomes clearer.
The field of network security is a huge subject. To be a network security expert, you must be an expert on routers, switches, hubs, firewalls, intrusion detection systems (IDS), servers, desktops, email, HTTP, instant messages, sniffers, and a thousand other topics. There are... | | |
|
| | Automating System Administration with Perl: Tools to Make You More Efficient
If you do systems administration work of any kind, you have to deal with the growing complexity of your environment and increasing demands on your time. Automating System Administration with Perl, Second Edition, not only offers you the right tools for your job, but also suggests the best way to approach specific problems and to securely... | | Moving to Linux: Kiss the Blue Screen of Death Goodbye!Say goodbye to Windows(R) crashes, viruses, hassles, and cost!
Moving to Linux can help you migrate from Windows to Linux in just hours! By the time you've finished, you'll be able to do virtually anything in Linux-without the aggravation, crashes, security risks, or... |
|
|
Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 |