Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Understanding Voice over IP Security (Artech House Telecommunications Library)
Understanding Voice over IP Security (Artech House Telecommunications Library)

VoIP is poised to take over from the century-old public switched telephone network (PSTN). But VoIP telephony does not enjoy the same privacy as the old PSTN. This is because PSTN phone calls were based on establishing a “closed circuit” between the two parties, while VoIP phone calls send packets through the Internet, which...

The Healthy PC: Preventive Care and Home Remedies for Your Computer
The Healthy PC: Preventive Care and Home Remedies for Your Computer

Keep Your PC Running Smoothly--Without Spending a Lot of Money!

Solve everyday PC problems, improve performance and speed, and protect yourself from malicious attacks with the helpful tips in this user-friendly guide. Easy-to-follow "recipes" show you, click-by-click, how to prevent computer catastrophes and recover completely...

Fixing Windows XP Annoyances : How to Fix the Most Annoying Things About the Windows OS
Fixing Windows XP Annoyances : How to Fix the Most Annoying Things About the Windows OS

Windows XP is the most popular operating system on the planet--and the most annoying. From incomprehensible error messages to inexplicable crashes, from wonky wireless setups to just finding a file, Windows can make your computing life a nightmare. But thanks to Fixing Windows XP Annoyances, you...

Beginning RSS and Atom Programming
Beginning RSS and Atom Programming
RSS and Atom are specifications that give users the power to subscribe to information they want to receive and give content developers tools to provide continuous subscriptions to willing recipients in a spam-free setting. RSS and Atom are the technical power behind the growing millions of blogs on the Web. Blogs change the Web from a set of static...
iPhone Open Application Development: Write Native Objective-C Applications for the iPhone
iPhone Open Application Development: Write Native Objective-C Applications for the iPhone
Certain technologies bring out everyone's hidden geek, and iPhone did the moment it was released. Even though Apple created iPhone as a closed device, tens of thousands of developers bought them with the expressed purpose of designing and running third-party software. In this clear and concise book, veteran hacker Jonathan Zdziarski -- one of the...
Microsoft Exchange Server 2013 Inside Out Connectivity, Clients, and UM
Microsoft Exchange Server 2013 Inside Out Connectivity, Clients, and UM

With a focus on connectivity, clients, and unified messaging, this book delivers the ultimate, in-depth reference to IT professionals planning and managing an Exchange Server 2013 deployment. Guided by Paul Robichaux, a Microsoft MVP and popular author, you will:

  • Understand how Exchange Server 2013 works with previous...
Cyber Spying: Tracking Your Family's (Sometimes) Secret Online Lives
Cyber Spying: Tracking Your Family's (Sometimes) Secret Online Lives
Uncover the Threats Lurking in the Darkness of Your Family's Computer

Many people have no idea of the evils that exist across the Internet or the danger that can result from simply answering an innocent-sounding e-mail or participating in a chat. Your loved ones could unknowingly be putting themselves in grave risk. By using...

Black Hat: Misfits, Criminals, and Scammers in the Internet Age
Black Hat: Misfits, Criminals, and Scammers in the Internet Age

Homes are becoming increasingly wired and, thanks to Wi-Fi, unwired. Hackers can strike quickly and create disastrous results! These stories and follow-ups are a fascinating insight into the modern threats we all face in the techno jungle. Written by internationally recognized author, John Biggs, this book is an ideal read...

Microsoft Windows Security Fundamentals: For Windows 2003 SP1 and R2
Microsoft Windows Security Fundamentals: For Windows 2003 SP1 and R2
This is the first of two books serving as an expanded and up-dated version of Windows Server 2003 Security Infrastructures for Windows 2003 Server R2 and SP1 & SP2. The authors choose to encompass this material within two books in order to illustrate the intricacies of the different paths used to secure MS Windows server networks.
...
SpamAssassin
SpamAssassin

Sys admins can field scores of complaints and spend months testing software suites that turn out to be too aggressive, too passive, or too complicated to setup only to discover that SpamAssassin (SA), the leading open source spam-fighting tool, is free, flexible, powerful, highly-regarded, and remarkably effective. The...

Easy Computer Basics, Windows 7 Edition
Easy Computer Basics, Windows 7 Edition

See it done. Do it yourself. It’s that Easy! Easy Computer Basics, Windows 7 Edition  teaches you the fundamentals to help you get the most from your computer hardware and software. Fully illustrated steps with simple instructions guide you through each task, building the skills you need to perform the most common computer tasks....

Mobile Marketing: Finding Your Customers No Matter Where They Are
Mobile Marketing: Finding Your Customers No Matter Where They Are

I believe that mobile marketing is the marketing of the future. My name is Cindy Krum, and I am the author of Mobile Marketing: Finding Your Customers No Matter Where They Are. This book is intended to be a comprehensive guide for marketers and anyone who wants a clearer understanding of how they can integrate mobile marketing with their...

unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy