|
|
Windows Vista Just the Steps For Dummies (Computer/Tech)Just the steps you need to get going with Vista today!
Simple steps...
...for great results
Move a File or Folder
- Right-click Start menu button and choose Explore.
- In the resulting Windows Explorer window (see Figure 3-8), double-click a folder...
| | Physical Security for IT"Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each... | | |
|
IT Disaster Recovery Planning For Dummies (Computer/Tech)Create a safety net while you work out your major plan
Identify critical IT systems, develop a long-range strategy, and train your people
Some disasters get coverage on CNN — some just create headaches for the affected organization. The right plan will get your business back... | | Switching to the Mac: The Missing Manual, Leopard EditionIs Windows giving you pause? Ready to make the leap to the Mac instead? There has never been a better time to switch from Windows to Mac, and this incomparable guide will help you make a smooth transition. New York Times columnist and Missing Manuals creator David Pogue gets you past three challenges: transferring your stuff, assembling Mac... | | Computer Viruses For DummiesBuild up your defenses against online germ warfare
Discover how viruses work and how to outsmart the cyber-thugs who create them
Viruses, worms, and Trojan horses create a serious health problem for your PC, but this handy little book has the antidote! It’ll help you exterminate those nasty bugs and protect your... |
|
Test Driving Linux: From Windows to Linux in 60 SecondsFor years, computer users have put up with the bugs, security holes, and viruses on Windows because they had no choice. Until recently, there has never been a good alternative to Windows. But now, Windows users can switch to Linux, the reliable, secure, and spyware free operating system. Linux is easy to use, runs on almost any PC, and enables you... | | InfoSecurity 2008 Threat AnalysisAn all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess... | | Economics of Identity Theft: Avoidance, Causes and Possible CuresToday, identity is more than anything, economic. The technology used to create, utilize and protect identities is increasingly ill-matched to the economics and uses of identities. Identity theft is the misuse of private authenticating information to steal money. Protecting identity requires privacy. Proving identity requires exposing information.... |
|
|
Result Page: 7 6 5 4 3 2 1 |