 |
|
 |  |  Steal This Computer Book 3: What They Won't Tell You About the InternetThis offbeat, non-technical book looks at what hackers do, how they do it, and how you can protect yourself. This edition also covers rootkits, spyware, web bugs, identity theft, hacktivism, wireless hacking (wardriving), biometrics, and firewalls.
WARNING: This book is not to be used for hacking into government computers, shutting... |  |  Running IPv6This is a book about running the IPv6 protocol in heterogeneous environments. It will tell you how to enable the protocol on Windows, MacOS, FreeBSD, Linux, and Cisco routers, and, up to a point, on Juniper routers. The intent behind the book is to present a clear view of the aspects to IPv6 that are of interest to those who’ll... |
|
|
 The All-Around Horse and RiderCinch today’s top new riding techniques
In the past twenty-five years, a number of major innovations in horse handling have gained acceptance in the global community. Now Howell presents a one-stop resource for amateur adult riders to help them understand the new approaches and implement them to achieve fast results.
Written by... |  |  The Conspirators Hierarchy: The Committee of Three HundredCan you imagine an all powerful group, that knows no national boundaries, above the laws of all countries, one that controls every aspect of politics, religion, commerce and industry; banking, insurance, mining, the drug trade, the petroleum industry, a group answerable to no one but its members. To the vast majority of us, such a group would... |  |  Malware Forensics: Investigating and Analyzing Malicious Code
Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and... |
|
 The Lucent Library of Science and Technology - Energy AlternativesEnergy drives all life and is a key component to how humanity works, lives, and sustains itself. Due to the depletion of existing energy sources and the damage being done to the earth's ecosystems, renewable, non-polluting energy sources such as solar, wind, and geothermal power, are being developed and implemented.
The twentieth-century... |  |  Now You Know: The Book of AnswersOur daily lives are filled with little sayings and habits that we don't think much about. Many of them have their roots in history and were passed down from our ancestors, and though the reasons for them have often been forgotten, they linger still. Have you ever wondered: - Why is there a best man at weddings and why are brides carried over... |  |  PC Magazine Fighting Spyware, Viruses, and MalwareThink there's no malicious software on your computer? PC Magazine thinks you should think again.
Scans by ISPs have revealed as many as twenty-eight spyware programs running on the average home computer—like yours. That's a lot of people prying into what's on your PC, and a DSL or cable connection is a virtual welcome mat. But by... |
|
| Result Page: 4 3 2 1 |