Home | Amazing | Today | Tags | Publishers | Years | Search 
Mac Security Bible
Mac Security Bible

Your essential, no-holds-barred guide to Mac security threats and solutions

Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely guide, he not only takes you beyond the myths, he also delves into...

Facebook: The Missing Manual
Facebook: The Missing Manual

Facebook's popularity is skyrocketing, drawing more than 400 million people to this combination online village green, personal website creator, and souped-up address book. But one thing you won't get when signing up is a printed manual. Enter Facebook: The Missing Manual, Second Edition -- the witty, authoritative...

SSL and TLS: Theory and Practice (Information Security and Privacy)
SSL and TLS: Theory and Practice (Information Security and Privacy)

SSL (secure socket layer) and TLS (Transport Layer Security) are widely deployed security protocols that are used in all kinds of web-based e-commerce and e-business applications and are part of most contemporary security systems available today. This practical book provides a comprehensive introduction to these protocols, offering you a...

Computers For Seniors For Dummies
Computers For Seniors For Dummies

Great advice on choosing a computer, getting online, and having fun!

Computers are an essential part of daily life these days, but they can be a bit intimidating at first. Computers For Seniors For Dummies, 2nd Edition gets you going with lots of illustrations and easy-to-follow-instructions, never assuming you already know...

Mobile Marketing: Finding Your Customers No Matter Where They Are
Mobile Marketing: Finding Your Customers No Matter Where They Are

I believe that mobile marketing is the marketing of the future. My name is Cindy Krum, and I am the author of Mobile Marketing: Finding Your Customers No Matter Where They Are. This book is intended to be a comprehensive guide for marketers and anyone who wants a clearer understanding of how they can integrate mobile marketing with their...

Ethics: The Heart of Health Care
Ethics: The Heart of Health Care

Ethics: The Heart of Health Care — a classic ethics text in medical, health and nursing studies — is recommended around the globe for its straightforward introduction to ethical analysis. In this Third Edition David Seedhouse again demonstrates tangibly and graphically how ethics and health care are inextricably...

Biometric Technologies and Verification Systems
Biometric Technologies and Verification Systems

Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step...

The Facebook Era: Tapping Online Social Networks to Build Better Products, Reach New Audiences, and Sell More Stuff
The Facebook Era: Tapping Online Social Networks to Build Better Products, Reach New Audiences, and Sell More Stuff

“People in all demographics and regions of the world are more connected than ever before to the products, issues, places, and individuals in their lives. This book recognizes that we’ve come to a place where people can represent their real identity--both personal and professional--and use the social filters...

Professional Blogging For Dummies
Professional Blogging For Dummies

Take your hobby to the next level and turn your blog into real income

Anyone who blogs knows that it is a fun, creative way for sharing thoughts and opinions. Now imagine making money from that hobby! This practical, how-to guide shows you how you can get serious about using your blog and implement advertising, sponsorship,...

Nokia Firewall, VPN, and IPSO Configuration Guide
Nokia Firewall, VPN, and IPSO Configuration Guide
The Only Book and Companion Web Site Covering Nokia's Firewall/VPN Appliances, which is the #3 security appliance worldwide.

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its
...
The Cambridge Handbook of Information and Computer Ethics
The Cambridge Handbook of Information and Computer Ethics

Information and Communication Technologies (ICTs) have profoundly changed many aspects of life, including the nature of entertainment, work, communication, education, healthcare, industrial production and business, social relations and conflicts. They have had a radical and widespread impact on our moral lives and hence on contemporary...

My New iPad: A User's Guide
My New iPad: A User's Guide

The iPad is cute. It's lovable. It's fun to play with. And it's a bit mysterious.

My New iPad is your guide to getting more from your new iPad, Apple's latest magical creation. You'll learn how to do the things you want to do right now—like surf the Internet, send email, listen to music,...

Result Page: 40 39 38 37 36 35 34 33 32 31 30 29 28 27 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy