299 3 16MB
English Pages 424 Year 2005
Report DMCA / Copyright
DOWNLOAD CHM FILE
Spitzner defines the various types of "honeypots" that are used to emulate security breeches on computer netwo
610 10 2MB Read more
The ultimate guide to this rapidly growing cutting-edge technology. Written with the guidance of three legal experts, th
404 89 2MB Read more
This book introduces a new weapon in computer warfare which helps to collect more information about malicious websites,
152 99 3MB Read more
As the only complete reference for Windows command line utilities, this book take an in-depth look at the often-overlook
403 92 6MB Read more
417 19 15MB Read more
417 74 24MB Read more
Hey, you know your way around a desktop-so now dig into the Windows operating system and really put its security feature
433 22 19MB Read more
381 83 2MB Read more
Windows Administration at the Command Line describes the complete set of command-line utilities that comes with Windows
464 42 4MB Read more
Formerly the Director of Visual Interface Design at Microsoft, Howlett headed the team that designed Windows 3.1, 95 and
309 52 117MB Read more