Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

The Covid-19 Vaccine Guide: The Quest for Implementation of Safe and Effective Vaccinations
The Covid-19 Vaccine Guide: The Quest for Implementation of Safe and Effective Vaccinations
What you should know about the Covid-19 vaccines from top experts in the field.

As the SARS-Cov2 virus emerged and spread globally in early 2020, unprecedented international efforts began to develop and test vaccines to control the devastating pandemic. This book focuses on the remarkable progress in developing
...
Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)
Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)

You've just gotta love Ubuntu; it's an irresistible package of usability, security, and support features. But a power user like you is just itching to teach it some new tricks. Show it how to play nicely with other systems. Develop its multitasking and communication skills. Free its inner video and graphics talents. And make sure that when it...

Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux: A Guide to Open Source Security is designed to help you deploy a Linux system on the Internet in a variety of security roles.This book provides practical instructions and pointers concerning the open source security tools that we use every day.

First, we show you how to obtain
...
Emergency: This Book Will Save Your Life
Emergency: This Book Will Save Your Life

With the same sharp eye, quick with, and narrative drive that marked his bestsellers The Game, The Dirt, and How to Make Love Like a Porn Star, Neil Strauss takes us on a white-knuckled journey through America's heart of darkness as he scrambles to escape the system. It's one man's story of a dangerous...

Configuring Symantec AntiVirus Corporate Edition
Configuring Symantec AntiVirus Corporate Edition
At some time in the last 15 years many of us blinked, and upon opening our eyes
we found the world on the verge of becoming one large network. Public and
private networks were interconnected both far and near, and now in your corner
of this interconnected puzzle, virus protection for the network has become
your
...
Introduction to Network Security (Networking Series)
Introduction to Network Security (Networking Series)
In today's online, connected world where computers outsell TVs and e-commerce sales surpass those of "brick-and-mortar" stores, secure network environments are a necessity. Weaknesses within networks have led to the rapid growth of identity theft and computer virus outbreaks, so the demand for skilled and aspiring system administrators...
Biopharmaceuticals in Plants: Toward the Next Century of Medicine
Biopharmaceuticals in Plants: Toward the Next Century of Medicine

Transgenic plants present enormous potential to become one of the most cost-effective and safe systems for large-scale production of proteins for industrial, pharmaceutical, veterinary, and agricultural uses. Over the past decade, much progress has been made with respect to the development of vaccines, antibodies, and other therapeutic...

Vmware Vcloud Security
Vmware Vcloud Security

Welcome to VMware vCloud Security. In this book, you will learn how to mitigate  the security threats on a private cloud running VMware vCloud Director. This  book will enable the reader with the knowledge, skills, and abilities to build a  highly secured private cloud running VMware vCloud. We will also look at a ...

Wastewater Pathogens (Wastewater Microbiology)
Wastewater Pathogens (Wastewater Microbiology)
A practical guide to wastewater pathogens

Wastewater treatment professionals face daily exposure to a wide variety of pathogens. These include viruses, bacteria, fungi, protozoa, and helminthes, as well as allergins, endotoxins, and exotoxins. While generally minimal, potential health hazards are still cause for concern....

Windows to Linux Migration Toolkit
Windows to Linux Migration Toolkit
This book will teach people how to migrate systems from Windows to Linux. It provides migration process planning, automated migration scripts, anti-virus / anti-spam solutions, and specific migration and deployment details for all relevant technologies. IT professionals who wish to maximize the value of their Windows to Linux migration services...
unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy