Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Alan Simpson's Windows XP Bible
Alan Simpson's Windows XP Bible
If Windows XP can do it, you can do it too ...

Windows XP is the undisputed market leader among operating systems, and the enhancements and security improvements in Service Pack 2 made it even better. So if you already know how to turn on a PC and use a mouse, here's the place to learn how to use every fabulous feature of Windows XP. Let an...

Information Warfare: How to Survive Cyber Attacks
Information Warfare: How to Survive Cyber Attacks

"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust...

Degunking Windows
Degunking Windows

All Windows users know that their PCs slowly develop problems—nasty gunk build-up that plagues their PCs. Here are some of the common symptoms: your PC starts to run slower, your applications will crash without warning, you can’t easily find your files and folders, you start getting tons of spam, and you encounter a host of other...

Disaster Recovery (EC-Council Disaster Recovery Professional)
Disaster Recovery (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Identifying Malicious Code Through Reverse Engineering (Advances in Information Security)
Identifying Malicious Code Through Reverse Engineering (Advances in Information Security)
Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world.

Identifying Malicious Code through Reverse Engineering provides information on reverse engineering and concepts that can be used to...

Sniffer Pro Network Optimization and Troubleshooting Handbook
Sniffer Pro Network Optimization and Troubleshooting Handbook
Imagine it is 4:00 P.M. and you are sitting at your desk with three books spread
across your lap.You are hard at work trying to figure out why performance on
your company’s file server has dropped sharply over the past eight hours. Of the
200 users in your company, nearly 100 of them have called to complain about
slow
...
Perioperative Transfusion Medicine
Perioperative Transfusion Medicine
Thoroughly updated for its Second Edition, this volume is the most comprehensive, current reference on perioperative transfusion medicine and coagulation. It provides complete information on all current blood products and transfusion risks, transfusion and coagulation issues during the preoperative, intraoperative, and postoperative periods, and...
Protocols for Micropropagation of Woody Trees and Fruits
Protocols for Micropropagation of Woody Trees and Fruits

Micropropagation has become a reliable and routine approach for large-scale rapid plant multiplication, which is based on plant cell, tissue and organ culture on well defined tissue culture media under aseptic conditions. A lot of research efforts are being made to develop and refine micropropagation methods and culture media for large-scale...

Firewall Policies and VPN Configurations
Firewall Policies and VPN Configurations
Deploying a network security policy is a significant and serious undertaking. Making good decisions in this matter will save a great deal of money and prevent many future security issues on your network, while making incorrect or hasty decisions will lay the foundation for an insecure network infrastructure. Creating a network security policy will...
Codes and Ciphers: Julius Caesar, the Enigma, and the Internet
Codes and Ciphers: Julius Caesar, the Enigma, and the Internet
For at least two thousand years there have been people who wanted to
send messages which could only be read by the people for whom they
were intended. When a message is sent by hand, carried from the sender
to the recipient, whether by a slave, as in ancient Greece or Rome, or by
the Post Office today, there is a risk of it
...
Neuroimmune Circuits, Drugs of Abuse, and Infectious Diseases (Advances in Experimental Medicine and Biology)
Neuroimmune Circuits, Drugs of Abuse, and Infectious Diseases (Advances in Experimental Medicine and Biology)
This volume is based on the proceedings of the 7th annual symposium on the topic Neuroimmune Circuits, Infectious Diseases and Drugs of Abuse, Bethesda, Maryland, October 7–9, 1999. This symposium, as in the past, focused on newer knowledge concerning the relationship between the immune and nervous systems with regards to the...
Foot-and-Mouth Disease Virus (Current Topics in Microbiology and Immunology)
Foot-and-Mouth Disease Virus (Current Topics in Microbiology and Immunology)

Foot-and-mouth disease (FMD) has been recognized in printed records dating from the sixteenth century, and since the eradication of rinderpest (cattle plague) in the early part of the twentieth century it has been rec- nized as the most important and feared disease of cattle and other dom- tic livestock. The beginning of the twenty-first...

Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy