Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and...

OpenStack Cloud Security
OpenStack Cloud Security

Build a secure OpenStack cloud to withstand all common attacks

About This Book

  • Design, implement, and deliver a safe and sound OpenStack cluster using best practices
  • Create a production-ready environment and protect your data on the cloud
  • A step-by-step tutorial packed with...
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Absolute Beginner's Guide to Security, Spam, Spyware & Viruses
Absolute Beginner's Guide to Security, Spam, Spyware & Viruses

Batten down the hatches! Hackers, spammers and thieves (oh my!) are after you! The mere act of turning on an Internet-connected computer can put you, your family, and your personal finances at risk by exposing you to viruses, scam artists, hackers, identity thieves, and spammers. How do you fight back? ...

Hacking Firefox: More Than 150 Hacks, Mods, and Customizations
Hacking Firefox: More Than 150 Hacks, Mods, and Customizations
They dreamed of a better browser . . . and before you could say "explore no more," Firefox was born. But already you want more. Tighter security, greater functionality. A custom installation for Linux. Maybe even that unique extension you've always dreamed of creating. Well, if you want to tweak the Fox, here are over 400 pages of ways...
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Net Crimes & Misdemeanors: Outmaneuvering Web Spammers, Stalkers, and Con Artists
Net Crimes & Misdemeanors: Outmaneuvering Web Spammers, Stalkers, and Con Artists
If you are reading this book or thinking about acquiring it, you have taken an important step toward increasing your awareness of the ways in which the Internet may be abused. J. A. Hitchcock has prepared a second edition of her popular book, Net Crimes and Misdemeanors, reflecting new ways in which you may encounter the dark side of global...
E-Mail Security: A Pocket Guide
E-Mail Security: A Pocket Guide

E-mail is now an established and increasingly essential channel of business and personal communication. As such, safeguarding its operation and integrity is an issue of widespread significance. At the same time, e-mail has proven itself to represent a considerable threat vector, providing a route for a variety of attacks including malware,...

PC Magazine Windows XP Security Solutions
PC Magazine Windows XP Security Solutions
Think you're safe?

Guess what?

Studies have estimated that up to 90 percent of computers are infected by some security threat or another. There's a good chance yours is among them, but any computer can be easily secured to a high level-if you know what you're doing.

They're out there. Trust PC Magazine to...

Using the Internet Safely For Seniors For Dummies (Computer/Tech)
Using the Internet Safely For Seniors For Dummies (Computer/Tech)
The Internet is amazing, but the risks you’ve heard about are real, too. You can avoid being a victim of online crime with the simple steps for staying safe online that you’ll find in Using the Internet Safely For Seniors For Dummies.

Here’s the guide you need to steer safely through the hazards so you can shop,...

Phishing Exposed
Phishing Exposed
Phishing Exposed provides an in-depth, high-tech view from both sides of the phishing playing field. In this unprecedented book, world-renowned phishing expert Lance James exposes the technical and financial techniques used by international clandestine phishing gangs to steal billions of dollars every year. The book is filled with...
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Data is stolen; this is no uncommon occurrence. The electronic information age has made the theft of data a very lucrative occupation. Whether it’s phishing scams or largescale data breaches, criminals stand to greatly benefit from electronic crimes, making their investment well worth the risk. When I say that this occurrence is not...
Result Page: 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy