 |
|
 Mobile Security: How to Secure, Privatize, and Recover Your Devices
Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens.
Overview
-
Learn how mobile devices are monitored and the impact of cloud computing
... |  |  BeagleBone For Dummies
The definitive, easy-to-use guide to the popular BeagleBone board
BeagleBone For Dummies is the definitive beginner's guide to using the popular BeagleBone board to learn electronics and programming. Unlike other books that require previous knowledge of electronics, Linux, and Python, this one assumes you know... |  |  |
|
 Linux+ Guide to Linux Certification
As Eric S. Raymond reminds us, Open Source Software will continue to shape the
dynamics of the computer software industry for the next long while, just as it has for the
last decade. Coined and perpetuated by hackers, the term “Open Source Software” refers
to software in which the source code is freely available to... |  |  |  |  |
|
 Network Forensics: Tracking Hackers through Cyberspace
My great-grandfather was a furniture maker. I am writing this on his table, sitting in his
chair. His world was one of craft, “the skilled practice of a practical occupation.”1 He made
furniture late in life that was in superficial respects the same as that which he made earlier,
but one can see his craft advance.
... |  |  |  |  |
|
|
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 |