Home | Amazing | Today | Tags | Publishers | Years | Search 
Foundations of Computer Security
Foundations of Computer Security
Anyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, and disk crashes. This book is intended as a starting point for those familiar with basic concepts of computers and computations and who would like to extend their knowledge into the realm of computer and network security. Its...
CryptoGraphics: Exploiting Graphics Cards For Security (Advances in Information Security)
CryptoGraphics: Exploiting Graphics Cards For Security (Advances in Information Security)

Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes.

CryptoGraphics: Exploiting Graphics Cards for Security...

Cleaning Windows Vista For Dummies (Computer/Tech)
Cleaning Windows Vista For Dummies (Computer/Tech)
Find out what you should clean, when, and how

Dump programs you don't need, archive data, and bring order to your desktop

Here's a handy household hint - getting control of all the clutter on your PC will make it run faster and more efficiently. This book is like a closet full of cleaning...

PC Magazine Windows XP Solutions
PC Magazine Windows XP Solutions
In the event of system failure

Sometimes a Windows XP installation can fail to the point where you can do nothing to save it. You have a number of options open to you, such as attempting to repair the installation and, at the other extreme, reformatting all your hard drives and starting over. However, often the easiest approach is to install a...

CISSP For Dummies (Computer/Tech)
CISSP For Dummies (Computer/Tech)

Cramming for the CISSP exam? This friendly test-prep guide makes studying a snap! Prepared by two CISSP-certified experts, it gets you up to speed on the latest changes to the exam and gives you proven test-taking tips. You’ll find complete coverage of all ten domains of the (ISC)2 Common Body of Knowledge to help you pass with flying...

Economics of Identity Theft: Avoidance, Causes and Possible Cures
Economics of Identity Theft: Avoidance, Causes and Possible Cures
Today, identity is more than anything, economic. The technology used to create, utilize and protect identities is increasingly ill-matched to the economics and uses of identities. Identity theft is the misuse of private authenticating information to steal money. Protecting identity requires privacy. Proving identity requires exposing information....
InfoSecurity 2008 Threat Analysis
InfoSecurity 2008 Threat Analysis
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess...
Test Driving Linux: From Windows to Linux in 60 Seconds
Test Driving Linux: From Windows to Linux in 60 Seconds
For years, computer users have put up with the bugs, security holes, and viruses on Windows because they had no choice. Until recently, there has never been a good alternative to Windows. But now, Windows users can switch to Linux, the reliable, secure, and spyware free operating system. Linux is easy to use, runs on almost any PC, and enables you...
Computer Viruses For Dummies
Computer Viruses For Dummies

Build up your defenses against online germ warfare

Discover how viruses work and how to outsmart the cyber-thugs who create them

Viruses, worms, and Trojan horses create a serious health problem for your PC, but this handy little book has the antidote! It’ll help you exterminate those nasty bugs and protect your...

Switching to the Mac: The Missing Manual, Leopard Edition
Switching to the Mac: The Missing Manual, Leopard Edition
Is Windows giving you pause? Ready to make the leap to the Mac instead? There has never been a better time to switch from Windows to Mac, and this incomparable guide will help you make a smooth transition. New York Times columnist and Missing Manuals creator David Pogue gets you past three challenges: transferring your stuff, assembling Mac...
IT Disaster Recovery Planning For Dummies (Computer/Tech)
IT Disaster Recovery Planning For Dummies (Computer/Tech)

Create a safety net while you work out your major plan

Identify critical IT systems, develop a long-range strategy, and train your people

Some disasters get coverage on CNN — some just create headaches for the affected organization. The right plan will get your business back...

Security for Mobile Networks and Platforms (Artech House Universal Personal Communications)
Security for Mobile Networks and Platforms (Artech House Universal Personal Communications)
With viruses, spyware, and a seemingly unending onslaught of new cyber-threats, security is a crucial and constant concern for all networking professionals. This is especially true for mobile networking professionals, who are all too aware of mobile technology's special vulnerability. This indispensable reference turns mobile network developers,...
Result Page: 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy