Home | Amazing | Today | Tags | Publishers | Years | Search 
Tony Redmond's Microsoft Exchange Server 2003: with SP1 (HP Technologies)
Tony Redmond's Microsoft Exchange Server 2003: with SP1 (HP Technologies)
Tony Redmond does it again! He provides detailed real-world information that will make you an expert on Exchange 2003. This book is a clear, to-the-point source of information filled with sound practical advice. Whether you're new to Exchange or upgrading your existing Exchange
systems, this detailed guide can help you tap all the power,
...
Bulletproofing TCP/IP Based Windows NT/2000 Networks
Bulletproofing TCP/IP Based Windows NT/2000 Networks
Find out about TCP/IP-based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure. Bulletproofing TCP/IP-based Windows NT/2000 Networks details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of...
Mainta Windows XP
Mainta Windows XP
Perform your own Windows XP maintenance and save $$$ Maintaining Windows XP 10 Easy Steps to Success By Ron Nykiforuk Heres an easy-to-follow program for maintaining your operating system for Windows XP. Dont wait until a virus sneaks in. Or slowness in startup, accessing files and starting programs occurs. It may be much more expensive and time...
Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
This book constitutes the refereed proceedings of the 7th International Workshop on Information Security Applications, WISA 2006, held in Jeju Island, Korea in August 2006.

The 30 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 146 submissions. The papers are organized in topical...

Canning Spam: You've Got Mail (That You Don't Want)
Canning Spam: You've Got Mail (That You Don't Want)
We've all seen it — the e-mails that come to us from a sender we don't know and promise a frog that jumps across our screen, a low mortgage rate or a medical miracle pill. These e-mails are otherwise known as spam. Your inbox gets cluttered or worse, your computer is infected with a virus as you scratch your head, wondering how it ever...
Networking All-in-One Desk Reference for Dummies
Networking All-in-One Desk Reference for Dummies
9 books in 1– your key to networking success!

Your one-stop guide to building, securing, and administering networks large and small

So you’re in charge of the network? No worries! This handy all-in-one guide provides a bird’s-eye view of all the important stuff, like installing and configuring various network...

How to Do Everything: Ubuntu
How to Do Everything: Ubuntu
Your hands-on guide to Ubuntu

Now it's easier than ever to get the most out of this wildly popular version of Linux. How to Do Everything: Ubuntu leads you through the interface, the built-in applications, and the process of installing software and peripherals. You'll get details on the full-featured OpenOffice.org...

Don't Get Bitten: The Dangers of Things That Bite or Sting
Don't Get Bitten: The Dangers of Things That Bite or Sting
Loaded with information on how to avoid...venom and...as well as practical tips, for staying safe from those bites. -- Billings Gazette

The little book loaded with information on how to avoid or deal with bites and stings in the great outdoors.

Includes:
Practical tips on staying safe from dangerous bites
...

Information Warfare: How to Survive Cyber Attacks
Information Warfare: How to Survive Cyber Attacks

"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust...

Identifying Malicious Code Through Reverse Engineering (Advances in Information Security)
Identifying Malicious Code Through Reverse Engineering (Advances in Information Security)
Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world.

Identifying Malicious Code through Reverse Engineering provides information on reverse engineering and concepts that can be used to...

Structure-based Study of Viral Replication
Structure-based Study of Viral Replication
This book addresses the innovative themes in characterizing the cellular membrane platforms and intracellular networking, as well as the architectural aspects of cell compartments mediated by the entry and replication cycles of viruses. The instrumentation of modern molecular and cellular biology provides a potent array of wave packets to image,...
Introduction to Network Security (Networking Series)
Introduction to Network Security (Networking Series)
In today's online, connected world where computers outsell TVs and e-commerce sales surpass those of "brick-and-mortar" stores, secure network environments are a necessity. Weaknesses within networks have led to the rapid growth of identity theft and computer virus outbreaks, so the demand for skilled and aspiring system administrators...
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy