Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Six Modern Plagues and How We Are Causing Them
Six Modern Plagues and How We Are Causing Them

"In a clear, engaging style, Dr. Walters tells the tale of each disease like a detective story. He allows each mystery to unfold as it did in reality, often slowly, through the lives of the plants and animals involved, the first human victims, the government officials who tried to respond, and the scientists who ultimately explained what...

The Internet: The Missing Manual
The Internet: The Missing Manual

The Internet is almost synonymous with change--that's one of its charms, and one of its headaches. You may think you know the Internet, but are you really up to speed on internet telephones, movie and TV downloading, blogging, gaming, online banking, dating, and photosharing?

This utterly current book...

Malicious Mobile Code: Virus Protection for Windows (O'Reilly Computer Security)
Malicious Mobile Code: Virus Protection for Windows (O'Reilly Computer Security)

Here are some sure things: you can't get a virus by simply reading an email. Malicious code can't harm hardware. A virus can't hide from a booted, write-protected diskette. Your computer can't get infected from a picture file. I have given this advice hundreds of times and could repeat it in my sleep. It was the mantra of every...

Look Both Ways: Help Protect Your Family on the Internet
Look Both Ways: Help Protect Your Family on the Internet
Learn the 14 ways in which you can help make the Internet a safer place for you and your family. You teach your children to look both ways before crossing the street. You tell them not to talk to strangers. But do you really know how to teach them to safely use the Internet? In this book, Linda Criddle, a leading child safety expert, offers a...
Antiviral Drug Discovery for Emerging Diseases and Bioterrorism Threats
Antiviral Drug Discovery for Emerging Diseases and Bioterrorism Threats
Promising drug discovery efforts in the race to cure emerging diseases and thwart bioterrorism

It was not too long ago that scientists believed that the discovery of powerful antimicrobial agents and vaccines would lead to the eradication of viral diseases. A warning, however, of the looming threat of viral diseases on U.S. national security...

RNA Viruses: A Practical Approach
RNA Viruses: A Practical Approach

This book provides a broad treatment of the principles and practice of R.N.A. virus research to insure the widest possible audience. It is perfect for laboratories involved in virus culture, including both academic and industrial research groups and public health laboratories.

...
Computer Viruses and Malware (Advances in Information Security)
Computer Viruses and Malware (Advances in Information Security)

Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the...

Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
This book constitutes the refereed proceedings of the 7th International Workshop on Information Security Applications, WISA 2006, held in Jeju Island, Korea in August 2006.

The 30 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 146 submissions. The papers are organized in topical...

Return of the Black Death: The World's Greatest Serial Killer
Return of the Black Death: The World's Greatest Serial Killer

If the twenty-first century seems an unlikely stage for the return of a 14th-century killer, the authors of Return of the Black Death argue that the plague, which vanquished half of Europe, has only lain dormant, waiting to emerge again—perhaps, in another form. At the heart of their chilling scenario is their contention...

Open Source Security Tools: Practical Guide to Security Applications, A
Open Source Security Tools: Practical Guide to Security Applications, A

Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses.

Written with the harried IT manager in mind, Open Source Security Tools is a practical,...

Bulletproofing TCP/IP Based Windows NT/2000 Networks
Bulletproofing TCP/IP Based Windows NT/2000 Networks
Find out about TCP/IP-based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure. Bulletproofing TCP/IP-based Windows NT/2000 Networks details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of...
PC Magazine Windows Vista Security Solutions
PC Magazine Windows Vista Security Solutions
When you want to defend Windows Vista,it's good to know a PC Magazine expert

Unless a time machine just dropped you in the 21st century, you already know that protecting your computer is essential. Now, here's Vista—new enough that no one is sure exactly what security threats might arise to hijack your...

Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy