|
|
|
|
Microsoft® Exchange Server 2007 Administrator's CompanionGet your mission-critical messaging and collaboration systemsup and running with the essential guide to deploying and managing ExchangeServer 2007. This comprehensive administrator's reference covers the fullrange of server and client deployments, unified communications, messagingsecurity, performance optimization, troubleshooting, and disaster... | | Easy Microsoft Windows 7SEE IT DONE. DO IT YOURSELF.
It’s that Easy! Easy Microsoft Windows 7 teaches you the fundamentals of working with Microsoft’s latest operating system. Fully illustrated steps with simple instructions guide you through every... | | Geeks On Call Security and Privacy: 5-Minute FixesBringing order to the lawless frontier
Almost daily, the boomtown growth of online activity generates more opportunities for cybercrime, identity theft, loss of data, and invasion of your privacy. To this lawless high-tech frontier comes the cavalry, mounted on (or in) blue PT Cruisers—Geeks On Call. Now they're... |
|
Mastering Windows Network Forensics and InvestigationConduct Cutting-Edge Forensic Investigations of Computer Crimes.
Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.
Now you can get the training you need in this... | | Outlook 2016 For Dummies (Outlook for Dummies)
Be more productive and simplify your life with Outlook 2016!
Ever feel like you're drowning in your inbox? Outlook 2016 For Dummies helps you lower the metaphorical water levels by quickly prioritizing incoming email. Instead of wading through messages and tasks all day, use Outlook as it was intended—as a... | | Chained Exploits: Advanced Hacking Attacks from Start to FinishThe complete guide to today’s hard-to-defend chained attacks: performing them and preventing them
Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve... |
|
Practical Security: Simple Practices for Defending Your Systems
Most security professionals don't have the words "security" or "hacker" in their job title. Instead, as a developer or admin you often have to fit in security alongside your official responsibilities - building and maintaining computer systems. Implement the basics of good security now, and... | | Windows Vista in a Nutshell: A Desktop Quick ReferenceThis unique reference thoroughly documents every important setting and feature in Microsoft's new operating system, with alphabetical listings for hundreds of commands, windows, menus, listboxes, buttons, scrollbars and other elements of Windows Vista. With this book's simple organization, you'll easily find any setting,... | | |
|
|
|
Result Page: 5 4 3 2 1 |