Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Zimbra: Implement, Administer and Manage: Get your organization up and running with Zimbra, fast
Zimbra: Implement, Administer and Manage: Get your organization up and running with Zimbra, fast

Zimbra is open-source server and client software for messaging and collaboration: email, group calendaring, contacts, and web document management and authoring. The Zimbra server is available for Linux, Mac OS X, appliances, and virtualization platforms. The Zimbra Web 2.0 Ajax client runs on Firefox, Safari, and IE, and features easy...

miRNA Regulation of the Translational Machinery (Progress in Molecular and Subcellular Biology)
miRNA Regulation of the Translational Machinery (Progress in Molecular and Subcellular Biology)

The silencing of gene expression by small interfering RNAs has been recognized for only a relatively short time, but this has transformed our understanding of both transcriptional and post-transcriptional gene regulatory mechanisms. Multiple pathways culminate in formation of an RNA-induced silencing complex (RISC) containing a member of the...

Blackhatonomics: An Inside Look at the Economics of Cybercrime
Blackhatonomics: An Inside Look at the Economics of Cybercrime

Would you be surprised if I say that the essence of cyber-crime comes down to traditional theft of property—be that of funds in accounts, of company data (and the financial harm that can cause), or of personal/confidential information (and the damage that can cause by it winding up in the wrong hands)? As time goes by, hackers, virus...

Computer Viruses: from theory to applications (Collection IRIS)
Computer Viruses: from theory to applications (Collection IRIS)
This book deals with computer viruses envisaged from three different points of view, namely the theoretical fundamentals of computer virology, algorithmic and practical aspects of viruses and their potential applications to various areas. The theoretical formalization by means of Turing machines, self-reproducing automata and recursive functions...
Python for Graph and Network Analysis (Advanced Information and Knowledge Processing)
Python for Graph and Network Analysis (Advanced Information and Knowledge Processing)

This research monograph provides the means to learn the theory and practice of graph and network analysis using the Python programming language. The social network analysis techniques, included, will help readers to efficiently analyze social data from Twitter, Facebook, LiveJournal, GitHub and many others at three levels of depth: ego,...

AVIEN Malware Defense Guide for the Enterprise
AVIEN Malware Defense Guide for the Enterprise
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected...
E-Mail Security: A Pocket Guide
E-Mail Security: A Pocket Guide

E-mail is now an established and increasingly essential channel of business and personal communication. As such, safeguarding its operation and integrity is an issue of widespread significance. At the same time, e-mail has proven itself to represent a considerable threat vector, providing a route for a variety of attacks including malware,...

Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
Drupal 6 Social Networking
Drupal 6 Social Networking
Build a social or community web site, with friends lists, groups, custom user profiles, and much more
  • Step-by-step instructions for putting together a social networking site with Drupal 6
  • Customize your Drupal installation with modules and themes to match the needs of almost any social networking site
  • ...
Windows Forensics and Incident Recovery
Windows Forensics and Incident Recovery

If you're responsible for protecting Windows systems, firewalls and anti-virus aren't enough. You also need to master incident response, recovery, and auditing. Leading Windows security expert and instructor Harlan Carvey offers a start-to-finish guide to the subject: everything administrators must know to recognize ...

PC Magazine Windows XP Security Solutions
PC Magazine Windows XP Security Solutions
Think you're safe?

Guess what?

Studies have estimated that up to 90 percent of computers are infected by some security threat or another. There's a good chance yours is among them, but any computer can be easily secured to a high level-if you know what you're doing.

They're out there. Trust PC Magazine to...

Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet

WHEN I FIRST MET BARRETT LYON in 2004, I was covering Internet security for the Los Angeles Times from an office in San Francisco. His story was so good—and met a journalistic need so deep—that I had a hard time believing it was true.

For more than a year, I had been grappling with an onslaught of urgent but...

Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy