Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
How to Do Everything: Ubuntu
How to Do Everything: Ubuntu
Your hands-on guide to Ubuntu

Now it's easier than ever to get the most out of this wildly popular version of Linux. How to Do Everything: Ubuntu leads you through the interface, the built-in applications, and the process of installing software and peripherals. You'll get details on the full-featured OpenOffice.org...

Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
...
Mucosal Immunology and Virology
Mucosal Immunology and Virology

An understanding of virus infection and the underlying role of the immune system in protection against these diseases is vital in today’s medical climate. Previously, only symptoms could be treated, as there were no antiviral therapies. The increasing amounts of research and the huge number of discoveries of immunologic agents and...

Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace (Queconsumerother)
Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace (Queconsumerother)
With the intense growth of e-business, we hear about an increase in hacking and technology-based criminal incidents. Institutions such as Citibank and Ebay have faced intrusions that have cost them millions of dollars in damages. With the onset of these criminal attacks, there is an increase in demand for products and services that provide more...
Principles of Information Security
Principles of Information Security
As global networks expand the interconnection of the world’s information systems, the smooth operation of communication and computing solutions becomes vital. However, recurring events such as virus and worm attacks and the success of criminal attackers illustrate the weaknesses in current information technologies and the...
The Healthy PC: Preventive Care and Home Remedies for Your Computer
The Healthy PC: Preventive Care and Home Remedies for Your Computer

Keep Your PC Running Smoothly--Without Spending a Lot of Money!

Solve everyday PC problems, improve performance and speed, and protect yourself from malicious attacks with the helpful tips in this user-friendly guide. Easy-to-follow "recipes" show you, click-by-click, how to prevent computer catastrophes and recover completely...

Hepatitis, An Issue of Infectious Disease Clinics, 1e (The Clinics: Internal Medicine)
Hepatitis, An Issue of Infectious Disease Clinics, 1e (The Clinics: Internal Medicine)
Several viruses are capable of causing hepatic inflammation. These include the Epstein-Barr virus, cytomegalovirus, herpes simplex virus, mumps, rubella, rubeola and varicella-zoster viruses, yellow fever virus, Coxsackie viruses, and adenoviruses. In most cases, infection or inflammation of the liver is part of a systemic...
Cardiovascular Disease in AIDS
Cardiovascular Disease in AIDS
Studies published before the introduction of highly active antiretroviral therapy (HAART) tracked the incidence and course of HIV infection in relation to cardiac illness in both children and adults. These studies show that subclinical echocardiographic abnormalities independently predict adverse outcomes and identify high-risk groups to be...
Windows 8 For Dummies
Windows 8 For Dummies

The bestselling tech book of all time, now updated for Windows 8

Microsoft Windows is the operating system that runs nearly 90 percent of the world's computers. Windows 8 will offer new interface updates, cloud-based services, and much more. This update of Andy Rathbone's bestselling Windows guide covers all the...

Elements of Computer Security (Undergraduate Topics in Computer Science)
Elements of Computer Security (Undergraduate Topics in Computer Science)

As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future.

...

Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Almost every contemporary corporation and organization has acquired and deployed security solutions or mechanisms to keep its networks and data secure. Hardware and software tools such as firewalls, network-based intrusion prevention systems, antivirus and antispam packages, host-based intrusion prevention solutions, and...
E-Mail: Communicate Effectively (NetEffect Series)
E-Mail: Communicate Effectively (NetEffect Series)
This easy-to-read, in-depth book contains comprehensive information and expert advice on communicating effectively and responsibly through e-mail. It provides readers with learning activities, tools, and tips to help them actually change behaviors and learn this critical workplace skill. Five chapters cover a variety of e-mail topics: saving...
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy