Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mobile Security: How to Secure, Privatize, and Recover Your Devices
Mobile Security: How to Secure, Privatize, and Recover Your Devices

Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens.

Overview

  • Learn how mobile devices are monitored and the impact of cloud computing
  • ...
Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on ... (Smart Innovation, Systems and Technologies)
Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on ... (Smart Innovation, Systems and Technologies)

Advanced Computing, Networking and Informatics are three distinct and mutually exclusive disciplines of knowledge with no apparent sharing/overlap among them. However, their convergence is observed in many real world applications, including cyber-security, internet banking, healthcare, sensor networks, cognitive radio, pervasive computing...

CCNP Data Center Application Centric Infrastructure 300-620 DCACI Official Cert Guide
CCNP Data Center Application Centric Infrastructure 300-620 DCACI Official Cert Guide
Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.

CCNP Data Center Application Centric...
Dreamweaver 8 : The Missing Manual
Dreamweaver 8 : The Missing Manual

Available for both the Mac and Windows, Macromedia's Dreamweaver 8 is a professional web design and development program used by millions of Internet professionals to build high-quality static and dynamic database-driven web sites. It offers drag-and-drop simplicity, streamlined HTML coding tools, and powerful database integration...

Core Python Programming (Prentice Hall Ptr Core Series)
Core Python Programming (Prentice Hall Ptr Core Series)
Python is an Internet and systems programming language that is soaring in popularity in today's fast-paced software development environment, and no wonder: it's simple (yet robust), object-oriented (yet can be used as a procedural language), extensible, scalable and features an easy to learn syntax that is clear and concise. Python combines the...
Peer-to-Peer : Harnessing the Power of Disruptive Technologies
Peer-to-Peer : Harnessing the Power of Disruptive Technologies

The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and...

Real World Linux Security (2nd Edition)
Real World Linux Security (2nd Edition)

 

Stop today's most vicious Internet attackers—right in their tracks!

Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or...

MySpace Unraveled: What it is and how to use it safely
MySpace Unraveled: What it is and how to use it safely
Do you know what your children are up to on MySpace? MySpace Unraveled: What it is and how to use it safely discusses the booming MySpace social-networking phenomenon and shows you exactly what you need know about MySpace and how to create a safe online experience for your kids. Written by Larry Magid and Anne Collier of Family Tech...
Programming INDIGO
Programming INDIGO

Microsoft Code Name “Indigo” is an advanced infrastructure and programming model for creating connected applications. It's like nothing that has come before. That's a bold statement, so allow me to put it in perspective for you.

I wrote my first communication program over 20 years ago and...

JSP: Practical Guide for Programmers
JSP: Practical Guide for Programmers
It has been more than 10 years since the introduction of the Mosaic Web browser from NCSA when the Web first achieved widespread notice. Early Web pages were generally simple, as people slowly learned the new Hypertext Markup Language (HTML) concepts. As the Internet-browser wars heated up, more people entered the fray, and different technologies,...
Machine Translation: Its Scope and Limits
Machine Translation: Its Scope and Limits
Machine Translation (MT) is both an engineering technology and a measure of all things to do with languages and computers—whenever a new theory of language or linguistics is offered, an important criteria for its success is whether or not it will improve machine translation.

This book presents a history of machine translation (MT) from...

Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets
Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets
Inside the Minds: Security Matters is an authoritative, insider's perspective on the ins and outs of the security industry and the future of the business, on a global scale. Featuring CEOs, Presidents, and Chief Information Security Officers, all representing some of the nation's top companies, this book provides a broad, yet comprehensive...
unlimited object storage image
Result Page: 333 332 331 330 329 328 327 326 325 324 323 322 321 320 319 318 317 316 315 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy