Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Canning Spam: You've Got Mail (That You Don't Want)
Canning Spam: You've Got Mail (That You Don't Want)
We've all seen it — the e-mails that come to us from a sender we don't know and promise a frog that jumps across our screen, a low mortgage rate or a medical miracle pill. These e-mails are otherwise known as spam. Your inbox gets cluttered or worse, your computer is infected with a virus as you scratch your head, wondering how it ever...
Scientific Modeling and Simulations (Lecture Notes in Computational Science and Engineering)
Scientific Modeling and Simulations (Lecture Notes in Computational Science and Engineering)

The conceptualization of a problem (modeling) and the computational solution of this problem (simulation), is the foundation of Computational Science. This coupled endeavor is unique in several respects. It allows practically any complex system to be analyzed with predictive capability by invoking the multiscale paradigm linking...

Microsoft Outlook 2010 Inside Out
Microsoft Outlook 2010 Inside Out

You're beyond the basics, so dive right in and take control of your schedule and business communications from the inside out! This in-depth reference packs hundreds of timesaving solutions, troubleshooting tips, and workarounds in a supremely organized format. It's all muscle and no fluff. Discover how the experts manage...

PC Magazine - February 7 2006
PC Magazine - February 7 2006
February 7, 2006

First Looks
Envision EN7600
...
Writing Security Tools and Exploits
Writing Security Tools and Exploits
Exploits. In most information technology circles these days, the term exploits has
become synonymous with vulnerabilities or in some cases, buffer overflows. It is not
only a scary word that can keep you up at night wondering if you purchased the best
firewalls, configured your new host-based intrusion prevention system correctly,
...
Secure Messaging with Microsoft  Exchange Server 2003
Secure Messaging with Microsoft Exchange Server 2003

Get expert guidance to assess and help improve the security of your Exchange Server 2003 messaging systems. From risk assessment to implementation and auditing procedures, get critical guidance to help enhance the security of your messaging infrastructure. Written by a network security expert who works closely with the Microsoft Exchange...

Human Herpesviruses: Biology, Therapy, and Immunoprophylaxis
Human Herpesviruses: Biology, Therapy, and Immunoprophylaxis

This definitive and comprehensive account of the human herpes viruses provides an encyclopedic overview of their basic virology and clinical manifestations. This group of viruses includes human simplex type 1 and 2, Epstein Barr virus, cytomegalovirus and varicella-zoster virus. The diseases they cause are significant and often recurrent....

Recombinant Protein Production in Yeast (Methods in Molecular Biology)
Recombinant Protein Production in Yeast (Methods in Molecular Biology)

This volume provides an overview of the main yeast production platforms currently used and future yeast cell factories for recombinant protein production. Chapters detail approaches of genetic and metabolic engineering, co-factor containing proteins and virus-like particles, glycoproteins, and post-translational...

Don't Get Bitten: The Dangers of Things That Bite or Sting
Don't Get Bitten: The Dangers of Things That Bite or Sting
Loaded with information on how to avoid...venom and...as well as practical tips, for staying safe from those bites. -- Billings Gazette

The little book loaded with information on how to avoid or deal with bites and stings in the great outdoors.

Includes:
Practical tips on staying safe from dangerous bites
...

Alan Simpson's Windows XP Bible
Alan Simpson's Windows XP Bible
If Windows XP can do it, you can do it too ...

Windows XP is the undisputed market leader among operating systems, and the enhancements and security improvements in Service Pack 2 made it even better. So if you already know how to turn on a PC and use a mouse, here's the place to learn how to use every fabulous feature of Windows XP. Let an...

Information Warfare: How to Survive Cyber Attacks
Information Warfare: How to Survive Cyber Attacks

"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust...

Degunking Windows
Degunking Windows

All Windows users know that their PCs slowly develop problems—nasty gunk build-up that plagues their PCs. Here are some of the common symptoms: your PC starts to run slower, your applications will crash without warning, you can’t easily find your files and folders, you start getting tons of spam, and you encounter a host of other...

unlimited object storage image
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy