Operating Systems category: 3874 books

Cover of Consumer Guide to Computer Security: Fight Back Against Identity Theft, Malware, Hackers, Spyware, Spam, Botnets, Phishing - Online Privacy - Wireless, Laptop, Hotspot Security
by Progressive Management
Language: English
Release Date: May 16, 2011

Information for consumers includes fighting back against identity theft, how identity theft occurs, procedures to follow for victims, including sample letters and communications, email scams, botnets, hackers and spam, health online, home wireless security, identity theft, internet auctions, kids'...
Cover of The Computer Fraud and Abuse Act -- A Guide for General Counsels and CIOs
by Nick Akerman
Language: English
Release Date: May 7, 2012

No company is immune from data theft — whether from hackers who are intent on stealing the company’s trade secrets, disgruntled employees who are looking for a competitive edge when they leave to join a new firm, or fraudsters who steal personal data to commit identity theft. The Computer Fraud and...
Cover of Cybersecurity Law
by Jeff Kosseff
Language: English
Release Date: February 14, 2017

A definitive guide to cybersecurity law Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive...
Cover of Powering your home theater from your Mac
by Scott McNulty
Language: English
Release Date: July 27, 2011

Your Mac is chock-full of movies, TV shows, and music, and that’s great. But what about that big old high-definition TV in the living room or the radio in the bathroom? How do you get your music to stream to every room in the house? In this project, I show you how. This is a single short project. Other...
Cover of 60+ iPad iOS 7 Quick-Start Tips and Tricks to Get You Started with Your iPad

60+ iPad iOS 7 Quick-Start Tips and Tricks to Get You Started with Your iPad

(For iPad 2, iPad 3, The New iPad, or iPad Mini with iOS 7)

by Scott La Counte
Language: English
Release Date: September 22, 2013

My parents are official iPad users. I began writing this book when I realized that they could check Facebook, but didn’t have the faintest idea how to make the text size bigger on Safari and a number of other things that I thought were commonsense after using the tablet for a day. I decided to make...
Cover of Childproof your Mac, with Mac OS X Lion
by Scott McNulty
Language: English
Release Date: July 27, 2011

Perhaps you have a couple of kids, and you want them to be able to use your Mac, but you don’t want them to have access to certain Web sites or applications. That’s where Parental Controls come in. Parental Controls allow you to create separate accounts for people and limit exactly what those account...
Cover of GET THE BEST PERFORMANCE FOR ANDROID DEVICES AND SMART PHONES

GET THE BEST PERFORMANCE FOR ANDROID DEVICES AND SMART PHONES

Speed - Battery – Data Usage - Security

by Aham Nzenwata
Language: English
Release Date: May 6, 2014

Cover of Video conferencing, with Mac OS X Lion
by Scott McNulty
Language: English
Release Date: July 27, 2011

Now that fast Internet connections are the norm, videoconferencing is hotter than ever. Why is it so popular? Apple’s decision to include a webcam on every portable Mac certainly helps, but so does the ease of use of applications like Skype. Lots of videoconferencing apps and solutions are available,...
Cover of Fire in the Valley

Fire in the Valley

The Birth and Death of the Personal Computer

by Michael Swaine, Paul Freiberger
Language: English
Release Date: October 20, 2014

In the 1970s, while their contemporaries were protesting the computer as a tool of dehumanization and oppression, a motley collection of college dropouts, hippies, and electronics fanatics were engaged in something much more subversive. Obsessed with the idea of getting computer power into their own...
Cover of ISO27001:2013 Assessments Without Tears
by Steve Watkins
Language: English
Release Date: October 29, 2013

 The audit process can be a daunting one as an auditor can direct questions at any employee within your organisation. Written in a clear plain style, this pocket guide offers a tried and tested briefing, and should be issuedto staff in advance of the audit to help them prepare for the experienceand...
Cover of Theory of Cryptography

Theory of Cryptography

14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II

by
Language: English
Release Date: October 24, 2016

The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016. The total of 45 revised full papers presented in the proceedings were carefully reviewed and...
Cover of Theory of Cryptography

Theory of Cryptography

14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I

by
Language: English
Release Date: October 21, 2016

The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016. The total of 45 revised full papers presented in the proceedings were carefully reviewed and...
Cover of Devops in Practice

Devops in Practice

Reliable and automated software delivery

by Danilo Sato
Language: English
Release Date: April 16, 2014

DevOps is a cultural and professional movement that's trying to break these walls. Focused on automation, collaboration, tool sharing and knowledge sharing, DevOps has been revealing that developers and system engineers have a lot to learn from one another. In this book, Danilo Sato will show you...
Cover of How to Hack Like a GOD

How to Hack Like a GOD

Hacking the Planet, #2

by sparc Flow
Language: English
Release Date: September 4, 2017

Ever wondered how hackers breach big corporations? Wonder no more. We detail a step-by-step real life scenario to hack a luxury brand, steal credit card data and spy on board members. Art of exploitation We start by building a small hardware backdoor that we plant in a retail store owned by...
First 93 94 95 96 97 98 99100
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy