Home | Amazing | Today | Tags | Publishers | Years | Search 
Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides
Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides
Since the publication of Malware Forensics: Investigating and Analyzing Malicious Code in 2008, the number and complexity of programs developed for malicious and illegal purposes has grown substantially. The 2011 Symantec Internet Security Threat Report announced that over 286 million new threats emerged in the past year....
Switching to the Mac: The Missing Manual, Lion Edition
Switching to the Mac: The Missing Manual, Lion Edition
What’s going on with the Mac these days?

Apple was the only computer company whose sales actually increased during the recession. The Mac’s market share has quadrupled since 2005—it’s now around 20 percent of computer sales in the U.S. And then there’s the most
...
Hepatocellular Cancer: Diagnosis and Treatment (Current Clinical Oncology)
Hepatocellular Cancer: Diagnosis and Treatment (Current Clinical Oncology)
Hepatocellular carcinoma (HCC) used to be regarded as a rare disease. The increasing numbers of chronic hepatitis C virus carriers in the United States and subsequent increased incidence of HCC seen in most large medical centers means that it is no longer an uncommon disease for most gastroenterologists or oncologists to...
Vmware Vcloud Security
Vmware Vcloud Security

Welcome to VMware vCloud Security. In this book, you will learn how to mitigate  the security threats on a private cloud running VMware vCloud Director. This  book will enable the reader with the knowledge, skills, and abilities to build a  highly secured private cloud running VMware vCloud. We will also look at a ...

Blackhatonomics: An Inside Look at the Economics of Cybercrime
Blackhatonomics: An Inside Look at the Economics of Cybercrime

Would you be surprised if I say that the essence of cyber-crime comes down to traditional theft of property—be that of funds in accounts, of company data (and the financial harm that can cause), or of personal/confidential information (and the damage that can cause by it winding up in the wrong hands)? As time goes by, hackers, virus...

Herpes Zoster: Recent Aspects of Diagnosis and Control (Monographs in Virology)
Herpes Zoster: Recent Aspects of Diagnosis and Control (Monographs in Virology)
Herpes zoster is a serious neurocutaneous disease which has been underestimated in terms of its burden, particularly in the elderly population. The overall incidence of herpes zoster in Europe is about 3 per 1,000 people and more than 10 per 1,000 people per year aged more than 80 years. Due to the growing life expectancy of the...
Community-Acquired Pneumonia (Birkh?user Advances in Infectious Diseases)
Community-Acquired Pneumonia (Birkh?user Advances in Infectious Diseases)
Community-acquired pneumonia is a disease of high morbidity and mortality. Demographic changes in industrialised countries with a growing population of elderly persons will add to its significance. In the last years much progress in the field of community-acquired pneumonia has been achieved. Vaccination programs against...
Rabies
Rabies

Rabies offers a complete account of one of the oldest known diseases threatening public health today. Unlike most research-oriented descriptions of rabies, this book provides a narrative about the disease and its etiologic agent, encompassing the historical background to recent developments. The emphasis on the basic biology and...

Ethical Hacking and Countermeasures: Secure Network Infrastructures (Ethical Hacking and Countermeasures: C/ E H: Certified Ethical Hacker)
Ethical Hacking and Countermeasures: Secure Network Infrastructures (Ethical Hacking and Countermeasures: C/ E H: Certified Ethical Hacker)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Windows to Linux Migration Toolkit
Windows to Linux Migration Toolkit
This book will teach people how to migrate systems from Windows to Linux. It provides migration process planning, automated migration scripts, anti-virus / anti-spam solutions, and specific migration and deployment details for all relevant technologies. IT professionals who wish to maximize the value of their Windows to Linux migration services...
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy