Home | Amazing | Today | Tags | Publishers | Years | Search 
PC Magazine Windows Vista Security Solutions
PC Magazine Windows Vista Security Solutions
When you want to defend Windows Vista,it's good to know a PC Magazine expert

Unless a time machine just dropped you in the 21st century, you already know that protecting your computer is essential. Now, here's Vista—new enough that no one is sure exactly what security threats might arise to hijack your...

Windows to Linux Migration Toolkit
Windows to Linux Migration Toolkit
This book will teach people how to migrate systems from Windows to Linux. It provides migration process planning, automated migration scripts, anti-virus / anti-spam solutions, and specific migration and deployment details for all relevant technologies. IT professionals who wish to maximize the value of their Windows to Linux migration services...
Windows Home Server For Dummies (Computer/Tech)
Windows Home Server For Dummies (Computer/Tech)
If you work in an office, you probably don’t lose much sleep worrying about whether your files are safe if your PC melts down. Company IT departments handle those things for business networks. But how about all those precious photos, address lists, the family genealogy, and everything else that lives on your home network? Windows Home Server...
How to Cheat at Securing Linux
How to Cheat at Securing Linux
Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system for the majority of their servers designed for medium to large size businesses. As with any technologies, increased...
Hacker Attack
Hacker Attack
Hacker Attack is the only book about computer security that is at once entertaining, understandable, and practical. You'll be fascinated as you read about hackers, crackers and whackers--people who spend their time trying to break into your computer, spreading computer viruses, or peeping (and recording what they see!) as you surf the Internet or...
Perioperative Transfusion Medicine
Perioperative Transfusion Medicine
Thoroughly updated for its Second Edition, this volume is the most comprehensive, current reference on perioperative transfusion medicine and coagulation. It provides complete information on all current blood products and transfusion risks, transfusion and coagulation issues during the preoperative, intraoperative, and postoperative periods, and...
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Security is a broad topic that is only becoming broader as we become more reliant on computers for everything we do, from work to home to leisure, and our computers become more and more interconnected. Most of our computing experiences now require, or are enriched by, Internet connections, which means our systems are constantly exposed to foreign...
E-Mail: Communicate Effectively (NetEffect Series)
E-Mail: Communicate Effectively (NetEffect Series)
This easy-to-read, in-depth book contains comprehensive information and expert advice on communicating effectively and responsibly through e-mail. It provides readers with learning activities, tools, and tips to help them actually change behaviors and learn this critical workplace skill. Five chapters cover a variety of e-mail topics: saving...
Antiviral Drug Discovery for Emerging Diseases and Bioterrorism Threats
Antiviral Drug Discovery for Emerging Diseases and Bioterrorism Threats
Promising drug discovery efforts in the race to cure emerging diseases and thwart bioterrorism

It was not too long ago that scientists believed that the discovery of powerful antimicrobial agents and vaccines would lead to the eradication of viral diseases. A warning, however, of the looming threat of viral diseases on U.S. national security...

Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace (Queconsumerother)
Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace (Queconsumerother)
With the intense growth of e-business, we hear about an increase in hacking and technology-based criminal incidents. Institutions such as Citibank and Ebay have faced intrusions that have cost them millions of dollars in damages. With the onset of these criminal attacks, there is an increase in demand for products and services that provide more...
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
...
Physical Security for IT
Physical Security for IT
"Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each...
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy