Home | Amazing | Today | Tags | Publishers | Years | Search 
Tony Redmond's Microsoft Exchange Server 2003: with SP1 (HP Technologies)
Tony Redmond's Microsoft Exchange Server 2003: with SP1 (HP Technologies)
Tony Redmond does it again! He provides detailed real-world information that will make you an expert on Exchange 2003. This book is a clear, to-the-point source of information filled with sound practical advice. Whether you're new to Exchange or upgrading your existing Exchange
systems, this detailed guide can help you tap all the power,
...
Don't Get Bitten: The Dangers of Things That Bite or Sting
Don't Get Bitten: The Dangers of Things That Bite or Sting
Loaded with information on how to avoid...venom and...as well as practical tips, for staying safe from those bites. -- Billings Gazette

The little book loaded with information on how to avoid or deal with bites and stings in the great outdoors.

Includes:
Practical tips on staying safe from dangerous bites
...

PC Magazine Fighting Spyware, Viruses, and Malware
PC Magazine Fighting Spyware, Viruses, and Malware
Think there's no malicious software on your computer? PC Magazine thinks you should think again.

Scans by ISPs have revealed as many as twenty-eight spyware programs running on the average home computer—like yours. That's a lot of people prying into what's on your PC, and a DSL or cable connection is a virtual welcome mat. But by...

Introduction to Network Security (Networking Series)
Introduction to Network Security (Networking Series)
In today's online, connected world where computers outsell TVs and e-commerce sales surpass those of "brick-and-mortar" stores, secure network environments are a necessity. Weaknesses within networks have led to the rapid growth of identity theft and computer virus outbreaks, so the demand for skilled and aspiring system administrators...
Structure-based Study of Viral Replication
Structure-based Study of Viral Replication
This book addresses the innovative themes in characterizing the cellular membrane platforms and intracellular networking, as well as the architectural aspects of cell compartments mediated by the entry and replication cycles of viruses. The instrumentation of modern molecular and cellular biology provides a potent array of wave packets to image,...
Identifying Malicious Code Through Reverse Engineering (Advances in Information Security)
Identifying Malicious Code Through Reverse Engineering (Advances in Information Security)
Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world.

Identifying Malicious Code through Reverse Engineering provides information on reverse engineering and concepts that can be used to...

Information Warfare: How to Survive Cyber Attacks
Information Warfare: How to Survive Cyber Attacks

"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust...

Canning Spam: You've Got Mail (That You Don't Want)
Canning Spam: You've Got Mail (That You Don't Want)
We've all seen it — the e-mails that come to us from a sender we don't know and promise a frog that jumps across our screen, a low mortgage rate or a medical miracle pill. These e-mails are otherwise known as spam. Your inbox gets cluttered or worse, your computer is infected with a virus as you scratch your head, wondering how it ever...
Mainta Windows XP
Mainta Windows XP
Perform your own Windows XP maintenance and save $$$ Maintaining Windows XP 10 Easy Steps to Success By Ron Nykiforuk Heres an easy-to-follow program for maintaining your operating system for Windows XP. Dont wait until a virus sneaks in. Or slowness in startup, accessing files and starting programs occurs. It may be much more expensive and time...
Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
This book constitutes the refereed proceedings of the 7th International Workshop on Information Security Applications, WISA 2006, held in Jeju Island, Korea in August 2006.

The 30 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 146 submissions. The papers are organized in topical...

Guide to Networking Essentials, Fourth Edition
Guide to Networking Essentials, Fourth Edition

This book is intended to serve the needs of individuals and information systems pro- fessionals who are interested in learning more about networking technologies, but who may have little or no background in this subject matter. In the first edition of this book, the materials were originally designed to help individuals prepare for Microsoft...

Networking All-in-One Desk Reference for Dummies
Networking All-in-One Desk Reference for Dummies
9 books in 1– your key to networking success!

Your one-stop guide to building, securing, and administering networks large and small

So you’re in charge of the network? No worries! This handy all-in-one guide provides a bird’s-eye view of all the important stuff, like installing and configuring various network...

Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy