Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace (Queconsumerother)
Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace (Queconsumerother)
With the intense growth of e-business, we hear about an increase in hacking and technology-based criminal incidents. Institutions such as Citibank and Ebay have faced intrusions that have cost them millions of dollars in damages. With the onset of these criminal attacks, there is an increase in demand for products and services that provide more...
Principles of Information Security
Principles of Information Security
As global networks expand the interconnection of the world’s information systems, the smooth operation of communication and computing solutions becomes vital. However, recurring events such as virus and worm attacks and the success of criminal attackers illustrate the weaknesses in current information technologies and the...
Pregnant in the Time of Ebola: Women and Their Children in the 2013-2015 West African Epidemic (Global Maternal and Child Health)
Pregnant in the Time of Ebola: Women and Their Children in the 2013-2015 West African Epidemic (Global Maternal and Child Health)

This comprehensive account of the deadliest Ebola outbreak in history examines its devastating effects on West Africa’s most vulnerable populations: pregnant women and children. Noted experts across disciplines assess health care systems’ responses to the epidemic in Liberia, Guinea, and Sierra Leone, emphasizing key...

The Healthy PC: Preventive Care and Home Remedies for Your Computer
The Healthy PC: Preventive Care and Home Remedies for Your Computer

Keep Your PC Running Smoothly--Without Spending a Lot of Money!

Solve everyday PC problems, improve performance and speed, and protect yourself from malicious attacks with the helpful tips in this user-friendly guide. Easy-to-follow "recipes" show you, click-by-click, how to prevent computer catastrophes and recover completely...

Hepatitis, An Issue of Infectious Disease Clinics, 1e (The Clinics: Internal Medicine)
Hepatitis, An Issue of Infectious Disease Clinics, 1e (The Clinics: Internal Medicine)
Several viruses are capable of causing hepatic inflammation. These include the Epstein-Barr virus, cytomegalovirus, herpes simplex virus, mumps, rubella, rubeola and varicella-zoster viruses, yellow fever virus, Coxsackie viruses, and adenoviruses. In most cases, infection or inflammation of the liver is part of a systemic...
Cardiovascular Disease in AIDS
Cardiovascular Disease in AIDS
Studies published before the introduction of highly active antiretroviral therapy (HAART) tracked the incidence and course of HIV infection in relation to cardiac illness in both children and adults. These studies show that subclinical echocardiographic abnormalities independently predict adverse outcomes and identify high-risk groups to be...
Windows 8 For Dummies
Windows 8 For Dummies

The bestselling tech book of all time, now updated for Windows 8

Microsoft Windows is the operating system that runs nearly 90 percent of the world's computers. Windows 8 will offer new interface updates, cloud-based services, and much more. This update of Andy Rathbone's bestselling Windows guide covers all the...

Elements of Computer Security (Undergraduate Topics in Computer Science)
Elements of Computer Security (Undergraduate Topics in Computer Science)

As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future.

...

Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Almost every contemporary corporation and organization has acquired and deployed security solutions or mechanisms to keep its networks and data secure. Hardware and software tools such as firewalls, network-based intrusion prevention systems, antivirus and antispam packages, host-based intrusion prevention solutions, and...
E-Mail: Communicate Effectively (NetEffect Series)
E-Mail: Communicate Effectively (NetEffect Series)
This easy-to-read, in-depth book contains comprehensive information and expert advice on communicating effectively and responsibly through e-mail. It provides readers with learning activities, tools, and tips to help them actually change behaviors and learn this critical workplace skill. Five chapters cover a variety of e-mail topics: saving...
Virtualization Security (EC-Council Disaster Recovery Professional)
Virtualization Security (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

How to Cheat at Securing Linux
How to Cheat at Securing Linux
Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system for the majority of their servers designed for medium to large size businesses. As with any technologies, increased...
unlimited object storage image
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy