Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Unix & Internet Security, 3rd Edition
Practical Unix & Internet Security, 3rd Edition
This new edition of Practical Unix & Internet Security provides detailed coverage of today's increasingly important security and networking issues. Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication...
Structure-based Study of Viral Replication
Structure-based Study of Viral Replication
This book addresses the innovative themes in characterizing the cellular membrane platforms and intracellular networking, as well as the architectural aspects of cell compartments mediated by the entry and replication cycles of viruses. The instrumentation of modern molecular and cellular biology provides a potent array of wave packets to image,...
Caution! Wireless Networking: Preventing a Data Disaster
Caution! Wireless Networking: Preventing a Data Disaster
Sure you’re vulnerable.
Now here’s what you do about it

Calm down. There are definite dangers associated with wireless networking, but you hold the antidote in your hands. This guide, written by a respected security consultant, separates the genuine threats from the hype and hysteria. Then it tells you how to guard...

Pro Open Source Mail: Building an Enterprise Mail Solution
Pro Open Source Mail: Building an Enterprise Mail Solution

Providing the range of mail-related services expected by organizations can be a confusing, daunting process. Pro Open Source Mail: Building an Enterprise Mail Solution presents a comprehensive guide to managing the most important e-mail services, including user administration, mail transfer agents, remote e-mail access, virus...

Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
ABC of Aids (ABC Series)
ABC of Aids (ABC Series)

(BMJ Books) Univ. College London, UK. Reference for healthcare personnel managing patients with HIV infection. Contains data in a concise and easy-to-read format. Thoroughly revised and gives an overview of all aspects of HIV/AIDS. Well illustrated in color and halftone. Includes the latest data on epidemiology, psychosocial effects,...

Neurovirology: Viruses and the Brain, Volume 56 (Advances in Virus Research)
Neurovirology: Viruses and the Brain, Volume 56 (Advances in Virus Research)

This volume is the first in a planned series of thematic volumes for Advances in Virus Research. It covers the etiology, pathogenetic mechanisms, and clincial consequences of human neurotropic viruses. Buchmeier is a virologist, Campbell an immunologist, and both are extremely well known in their fields.

Numerous
...

Linux Email
Linux Email
Many businesses want to run their email servers on Linux for greater control and flexibility of corporate communications, but getting started can be complicated. The attractiveness of a free-to-use and robust email service running on Linux can be undermined by the apparent technical challenges involved. Some of the complexity arises from the fact...
Intermediate Security Testing with Kali Linux 2
Intermediate Security Testing with Kali Linux 2

With computer hacking attacks making headline news on a frequent occasion, learning ethical hacking has become a priority for those tasked with defending their networks. But in the sea of training material it is hard to find effectual training using the latest tools and techniques. In “Intermediate Security Testing with Kali Linux...

Lotus Domino 6 for Linux
Lotus Domino 6 for Linux
This IBM Redbook describes how to run the IBM Lotus Domino 6 server on the Linux platform. While Lotus Domino 6 is platform-independent, some specific knowledge about the platform and configuration is required to ensure that the Domino 6 server is running most efficiently.

The book provides detailed instructions for installing Linux and
...
Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills
Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills
Develop the skills you need in the real world

Hit the ground running with the street-smart training you'll find in this practical book. Using a "year in the life" approach, it gives you an inside look at the common responsibilities of security administrators, with key information organized around the actual...

Advances in Virus Research, Volume 70 (Vol. 70)
Advances in Virus Research, Volume 70 (Vol. 70)

Published since 1953, Advances in Virus Research covers a diverse range of in-depth reviews providing a valuable overview of the current field of virology.
In 2004, the Institute for Scientific Information released figures showing that the series has an Impact Factor of 2.576, with a half-life of 7.1 years, placing it 11th in
...

unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy