|
|
|
|
| | Principles of Information Security
As global networks expand the interconnection of the world’s information systems, the
smooth operation of communication and computing solutions becomes vital. However,
recurring events such as virus and worm attacks and the success of criminal attackers illustrate
the weaknesses in current information technologies and the... | | |
|
The Healthy PC: Preventive Care and Home Remedies for Your ComputerKeep Your PC Running Smoothly--Without Spending a Lot of Money!
Solve everyday PC problems, improve performance and speed, and protect yourself from malicious attacks with the helpful tips in this user-friendly guide. Easy-to-follow "recipes" show you, click-by-click, how to prevent computer catastrophes and recover completely... | | Hepatitis, An Issue of Infectious Disease Clinics, 1e (The Clinics: Internal Medicine)
Several viruses are capable of causing hepatic inflammation. These include
the Epstein-Barr virus, cytomegalovirus, herpes simplex virus, mumps,
rubella, rubeola and varicella-zoster viruses, yellow fever virus, Coxsackie
viruses, and adenoviruses. In most cases, infection or inflammation of the
liver is part of a systemic... | | Cardiovascular Disease in AIDSStudies published before the introduction of highly active antiretroviral therapy (HAART) tracked the incidence and course of HIV infection in relation to cardiac illness in both children and adults. These studies show that subclinical echocardiographic abnormalities independently predict adverse outcomes and identify high-risk groups to be... |
|
Windows 8 For Dummies
The bestselling tech book of all time, now updated for Windows 8
Microsoft Windows is the operating system that runs nearly 90 percent of the world's computers. Windows 8 will offer new interface updates, cloud-based services, and much more. This update of Andy Rathbone's bestselling Windows guide covers all the... | | Elements of Computer Security (Undergraduate Topics in Computer Science)
As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future.
... | | |
|
E-Mail: Communicate Effectively (NetEffect Series)This easy-to-read, in-depth book contains comprehensive information and expert advice on communicating effectively and responsibly through e-mail. It provides readers with learning activities, tools, and tips to help them actually change behaviors and learn this critical workplace skill. Five chapters cover a variety of e-mail topics: saving... | | Virtualization Security (EC-Council Disaster Recovery Professional)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... | | How to Cheat at Securing LinuxLinux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system for the majority of their servers designed for medium to large size businesses. As with any technologies, increased... |
|
|
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 |