Home | Amazing | Today | Tags | Publishers | Years | Search 
Seven Deadliest USB Attacks
Seven Deadliest USB Attacks

Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend...

Handbook of Neurochemistry and Molecular Neurobiology: Neuroimmunology
Handbook of Neurochemistry and Molecular Neurobiology: Neuroimmunology

Neuroimmunology is one of the most rapidly developing branches of Neurobiology, prompted by novel neurochemical, neuroendocrinological, and neurophysiological investigations of the central and peripheral nervous system including neuroendocrine systems. Neuroimmunology can be considered as an interdisciplinary science that covers relevant...

Emergency: This Book Will Save Your Life
Emergency: This Book Will Save Your Life

With the same sharp eye, quick with, and narrative drive that marked his bestsellers The Game, The Dirt, and How to Make Love Like a Porn Star, Neil Strauss takes us on a white-knuckled journey through America's heart of darkness as he scrambles to escape the system. It's one man's story of a dangerous...

Medical Microbiology, 24th edition
Medical Microbiology, 24th edition

The landmark clinical guide to the role microorganisms play in human health and illnesses -- extensively revised and updated

A Doody's Core Title!

Linking fundamental microbiology concepts with the diagnosis and treatment of clinical infections, this one-of-a-kind, portable text delivers an essential...

Microsoft Outlook 2010 Inside Out
Microsoft Outlook 2010 Inside Out

You're beyond the basics, so dive right in and take control of your schedule and business communications from the inside out! This in-depth reference packs hundreds of timesaving solutions, troubleshooting tips, and workarounds in a supremely organized format. It's all muscle and no fluff. Discover how the experts manage...

Return of the Black Death: The World's Greatest Serial Killer
Return of the Black Death: The World's Greatest Serial Killer

If the twenty-first century seems an unlikely stage for the return of a 14th-century killer, the authors of Return of the Black Death argue that the plague, which vanquished half of Europe, has only lain dormant, waiting to emerge again—perhaps, in another form. At the heart of their chilling scenario is their contention...

Network Flow Analysis
Network Flow Analysis

You know that servers have log files and performance measuring tools and that traditional network devices have LEDs that blink when a port does something. You may have tools that tell you how busy an interface is, but mostly a network device is a black box. Network Flow Analysis opens that black box, demonstrating how to use...

Elements of Computer Security (Undergraduate Topics in Computer Science)
Elements of Computer Security (Undergraduate Topics in Computer Science)

As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future.

...

Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet

WHEN I FIRST MET BARRETT LYON in 2004, I was covering Internet security for the Los Angeles Times from an office in San Francisco. His story was so good—and met a journalistic need so deep—that I had a hard time believing it was true.

For more than a year, I had been grappling with an onslaught of urgent but...

E-Mail Security: A Pocket Guide
E-Mail Security: A Pocket Guide

E-mail is now an established and increasingly essential channel of business and personal communication. As such, safeguarding its operation and integrity is an issue of widespread significance. At the same time, e-mail has proven itself to represent a considerable threat vector, providing a route for a variety of attacks including malware,...

Macs For Dummies
Macs For Dummies

What an amazing time to get to know the Mac. For years these elegantly designed computers have been a model of simplicity and virus-free stability. But that’s never stopped Apple from making these machines even harder to resist by applying stunning changes.

Consider Apple’s seismic embrace of Intel a few years...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy