Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Simple Computer Security: Disinfect Your PC
Simple Computer Security: Disinfect Your PC
This book discusses the primary issues and threats that face all computer and Internet users. Not only does it describe the symptoms, prevalence, and affects of the most common computer security problems, it also provides simple solutions so you and your family will have a safe and pleasant online and computing experience....
Switching to the Mac: The Missing Manual, Snow Leopard Edition
Switching to the Mac: The Missing Manual, Snow Leopard Edition
What’s going on with the Mac these days?

Apple was the only computer company whose sales actually increased during the recession. The Mac’s market share has tripled since 2005. And Mac how-to book sales are up about 35 percent over two years ago (woo-hoo!).

And then there’s the most significant statistic of
...
Hepatocellular Cancer: Diagnosis and Treatment (Current Clinical Oncology)
Hepatocellular Cancer: Diagnosis and Treatment (Current Clinical Oncology)
Hepatocellular carcinoma (HCC) used to be regarded as a rare disease. The increasing numbers of chronic hepatitis C virus carriers in the United States and subsequent increased incidence of HCC seen in most large medical centers means that it is no longer an uncommon disease for most gastroenterologists or oncologists to...
Oncolytic Viruses (Methods in Molecular Biology)
Oncolytic Viruses (Methods in Molecular Biology)
Anecdotal clinical reports of tumor remissions after viral infections laid the foundation for the field of oncolytic virotherapy. Advances in molecular virology, tumor biology, and immunology have enabled more refined studies of tumor-selective viruses. Concomitant with the resurgence of cancer immunotherapy and after...
Upgrading & Fixing PCs For Dummies
Upgrading & Fixing PCs For Dummies

Covers upgrades for gaming, digital video, and entertainment!

Transform your PC into a glitch-free, turbocharged, multimedia machine

Want to add punch to your PC? This handy reference helps add power to your old computer. Easy steps show you how to add memory, update your virus...

Windows Vista Just the Steps For Dummies (Computer/Tech)
Windows Vista Just the Steps For Dummies (Computer/Tech)
Just the steps you need to get going with Vista today!

Simple steps...

...for great results

Move a File or Folder

  1. Right-click Start menu button and choose Explore.
  2. In the resulting Windows Explorer window (see Figure 3-8), double-click a folder...
Professional Windows Desktop and Server Hardening (Programmer to Programmer)
Professional Windows Desktop and Server Hardening (Programmer to Programmer)

Although not well known, Microsoft Windows has the best security of any popular operating system in the world today. What Windows has is poor default security. There are specific steps any professional can take to significantly increase the security of Microsoft Windows. Unfortunately, most books and the news media keep reinforcing the failed,...

Practical Unix & Internet Security, 3rd Edition
Practical Unix & Internet Security, 3rd Edition
This new edition of Practical Unix & Internet Security provides detailed coverage of today's increasingly important security and networking issues. Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication...
Structure-based Study of Viral Replication
Structure-based Study of Viral Replication
This book addresses the innovative themes in characterizing the cellular membrane platforms and intracellular networking, as well as the architectural aspects of cell compartments mediated by the entry and replication cycles of viruses. The instrumentation of modern molecular and cellular biology provides a potent array of wave packets to image,...
Caution! Wireless Networking: Preventing a Data Disaster
Caution! Wireless Networking: Preventing a Data Disaster
Sure you’re vulnerable.
Now here’s what you do about it

Calm down. There are definite dangers associated with wireless networking, but you hold the antidote in your hands. This guide, written by a respected security consultant, separates the genuine threats from the hype and hysteria. Then it tells you how to guard...

Pro Open Source Mail: Building an Enterprise Mail Solution
Pro Open Source Mail: Building an Enterprise Mail Solution

Providing the range of mail-related services expected by organizations can be a confusing, daunting process. Pro Open Source Mail: Building an Enterprise Mail Solution presents a comprehensive guide to managing the most important e-mail services, including user administration, mail transfer agents, remote e-mail access, virus...

Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy