|
|
|
|
|
The Next Million Years.WHEN anyone starts to write on a subject, at which he has not hitherto worked professionally, his proper procedure should be to set out on a long course of reading, with careful preparatory annotations of all he has read. Such a course on a tremendous subject like the present one might easily take ten years. At the time when I determined to write... | | Malware: Fighting Malicious CodeIgnoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy... | | |
|
| | SQL for DummiesDiscover how SQL:2003 handles images, XML files, and more
Use SQL to build databases, keep them safe, and access their information
Relationships are everything, especially when it comes to databases – so if you work with them, form a relationship with this book. It helps you use SQL to build databases, protect them from... | | Sams Teach Yourself Facebook in 10 MinutesSams Teach Yourself Facebook in 10 Minutes offers straightforward, practical answers
when you need fast results. By working through 10-minute lessons, you’ll learn everything you
need to know to quickly and easily get up to speed with Facebook.
... |
|
Network Security FundamentalsCompanies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise... | | Steal This Computer Book 3: What They Won't Tell You About the InternetThis offbeat, non-technical book looks at what hackers do, how they do it, and how you can protect yourself. This edition also covers rootkits, spyware, web bugs, identity theft, hacktivism, wireless hacking (wardriving), biometrics, and firewalls.
WARNING: This book is not to be used for hacking into government computers, shutting... | | Buying & Selling Music, Instruments, and Music Collectibles on eBayThis book is about eBay but with a twist. The focus is on buying and selling music-related items on eBay. We found a niche and it’s all about music!
It’s always fun to write about something you love. In this case, I’m truly blessed because I’m writing about two of my favorite things: eBay and music.
So,... |
|
|
Result Page: 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 |