Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security for Mobile Networks and Platforms (Artech House Universal Personal Communications)
Security for Mobile Networks and Platforms (Artech House Universal Personal Communications)
With viruses, spyware, and a seemingly unending onslaught of new cyber-threats, security is a crucial and constant concern for all networking professionals. This is especially true for mobile networking professionals, who are all too aware of mobile technology's special vulnerability. This indispensable reference turns mobile network developers,...
Steal This File Sharing Book
Steal This File Sharing Book

Steal This File Sharing Book tackles the thorny issue of file sharing, explaining how file sharing networks work and how to use them safely and effectively. There’s a wealth of free material available online—music, movies books, software, video games, even pornography. But do you know where to find that rare song...

Computer Viruses For Dummies
Computer Viruses For Dummies

Build up your defenses against online germ warfare

Discover how viruses work and how to outsmart the cyber-thugs who create them

Viruses, worms, and Trojan horses create a serious health problem for your PC, but this handy little book has the antidote! It’ll help you exterminate those nasty bugs and protect your...

Firefox and Thunderbird Garage (The Garage Series)
Firefox and Thunderbird Garage (The Garage Series)

Welcome to the next Internet revolution

Enter your Firefox and Thunderbird Garage...where you master the incredible free software that's helping millions of people use the Web and email faster, more efficiently, and more safely. Your guides know Firefox and Thunderbird better than anyone....

Windows XP Hacks & Mods For Dummies (Computer/Tech)
Windows XP Hacks & Mods For Dummies (Computer/Tech)
Make Windows XP look, feel, and act the way you want

Simplify searches, find free virus protection, and make Windows love your iPod®

Hacks? Mods? Don't be frightened — this book walks you through each and every one, and even steers you clear of well-known hacks that don't really accomplish anything. See how some simple...

Home Network Security Simplified
Home Network Security Simplified

Phishing. Malware. Spyware. Trojan horses. Firewalls. Parental controls. If you have a home computer connected to the Internet, you need to understand these security terms. If that connection is high-speed (always on) or you run a wireless network, your needyour vulnerabilityis that much greater. Now, with Home Network Security...

CryptoGraphics: Exploiting Graphics Cards For Security (Advances in Information Security)
CryptoGraphics: Exploiting Graphics Cards For Security (Advances in Information Security)

Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes.

CryptoGraphics: Exploiting Graphics Cards for Security...

InfoSecurity 2008 Threat Analysis
InfoSecurity 2008 Threat Analysis
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess...
Stopping Spyware
Stopping Spyware
Stop spyware in its tracks! Spyware infects the vast majority of home computers today. After it's on your machine, it can be used to access your social security number, track every website you visit, and take control of your computer away from you. If you work for a large company, odds are your company has purchased anti-spyware protection for...
Cleaning Windows Vista For Dummies (Computer/Tech)
Cleaning Windows Vista For Dummies (Computer/Tech)
Find out what you should clean, when, and how

Dump programs you don't need, archive data, and bring order to your desktop

Here's a handy household hint - getting control of all the clutter on your PC will make it run faster and more efficiently. This book is like a closet full of cleaning...

Upgrading and Repairing Microsoft Windows (Upgrading & Repairing)
Upgrading and Repairing Microsoft Windows (Upgrading & Repairing)

Fans of Upgrading and Repairing PCs, your call has been answered. Scott Mueller, author of the best-selling Upgrading and Repairing PCs, is now bringing you an equally in-depth guide to Windows troubleshooting. Upgrading and Repairing Microsoft Windows explains how Windows works and how to fix it when...

Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY

 

Clearly explains core concepts, terminology, challenges, technologies, and skills

 

Covers today’s latest attacks and...

unlimited object storage image
Result Page: 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy