Home | Amazing | Today | Tags | Publishers | Years | Search 
Drupal 6 Social Networking
Drupal 6 Social Networking
Build a social or community web site, with friends lists, groups, custom user profiles, and much more
  • Step-by-step instructions for putting together a social networking site with Drupal 6
  • Customize your Drupal installation with modules and themes to match the needs of almost any social networking site
  • ...
E-Mail: Communicate Effectively (NetEffect Series)
E-Mail: Communicate Effectively (NetEffect Series)
This easy-to-read, in-depth book contains comprehensive information and expert advice on communicating effectively and responsibly through e-mail. It provides readers with learning activities, tools, and tips to help them actually change behaviors and learn this critical workplace skill. Five chapters cover a variety of e-mail topics: saving...
Tony Redmond's Microsoft Exchange Server 2003: with SP1 (HP Technologies)
Tony Redmond's Microsoft Exchange Server 2003: with SP1 (HP Technologies)
Tony Redmond does it again! He provides detailed real-world information that will make you an expert on Exchange 2003. This book is a clear, to-the-point source of information filled with sound practical advice. Whether you're new to Exchange or upgrading your existing Exchange
systems, this detailed guide can help you tap all the power,
...
Physical Security for IT
Physical Security for IT
"Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each...
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
...
Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace (Queconsumerother)
Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace (Queconsumerother)
With the intense growth of e-business, we hear about an increase in hacking and technology-based criminal incidents. Institutions such as Citibank and Ebay have faced intrusions that have cost them millions of dollars in damages. With the onset of these criminal attacks, there is an increase in demand for products and services that provide more...
Antiviral Drug Discovery for Emerging Diseases and Bioterrorism Threats
Antiviral Drug Discovery for Emerging Diseases and Bioterrorism Threats
Promising drug discovery efforts in the race to cure emerging diseases and thwart bioterrorism

It was not too long ago that scientists believed that the discovery of powerful antimicrobial agents and vaccines would lead to the eradication of viral diseases. A warning, however, of the looming threat of viral diseases on U.S. national security...

Hacker Attack
Hacker Attack
Hacker Attack is the only book about computer security that is at once entertaining, understandable, and practical. You'll be fascinated as you read about hackers, crackers and whackers--people who spend their time trying to break into your computer, spreading computer viruses, or peeping (and recording what they see!) as you surf the Internet or...
Windows Home Server For Dummies (Computer/Tech)
Windows Home Server For Dummies (Computer/Tech)
If you work in an office, you probably don’t lose much sleep worrying about whether your files are safe if your PC melts down. Company IT departments handle those things for business networks. But how about all those precious photos, address lists, the family genealogy, and everything else that lives on your home network? Windows Home Server...
How to Cheat at Securing Linux
How to Cheat at Securing Linux
Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system for the majority of their servers designed for medium to large size businesses. As with any technologies, increased...
Bulletproofing TCP/IP Based Windows NT/2000 Networks
Bulletproofing TCP/IP Based Windows NT/2000 Networks
Find out about TCP/IP-based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure. Bulletproofing TCP/IP-based Windows NT/2000 Networks details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of...
Perioperative Transfusion Medicine
Perioperative Transfusion Medicine
Thoroughly updated for its Second Edition, this volume is the most comprehensive, current reference on perioperative transfusion medicine and coagulation. It provides complete information on all current blood products and transfusion risks, transfusion and coagulation issues during the preoperative, intraoperative, and postoperative periods, and...
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy