Downloads
Category:
Sub Category:
Keyword:


 
Total Items: 1050,   Total Pages: 70
Pages : 1234567... 70

CategoryNameCreditsDownloadsSize
VoIP FOR DUMmIES
Communications is the heart of your business, and voice over IP has the capability to strengthen that heart and thereby strengthen your business. VoIP is not just another form of connectivity. Yes, it combines the intimacy of voice with the power of data, but it is more than voice over the Internet or voice over your data network. It enables the merging of voice and data applications in ways that liberate business processes. VoIP extends voice communications to anyone, anywhere, over any device — it
Category: Books » Computer Science
Uploaded: 24-Jun-2011
0 21 8.35 MB  
تکمیل معرفت
دل کی غزا محبت ھے۔ایسی محبت جو الله پاک سے ھو۔
Category: Books » Islam
Uploaded: 22-Jun-2011
0 126 1.68 MB  
MIND GAMES
Mind Games :The Aging Brain & How To Keep it Healthy
Category: Books » Self Improvement
Uploaded: 21-Jun-2011
0 145 8.06 MB  
The Power of Impossible Thinking
>The Power of Impossible Thinking: Transform the Business of Your Life and the Life of Your Business
Category: Books » Self Improvement
Uploaded: 21-Jun-2011
0 78 13.85 MB  
Memory Skills In Business
This book is foe people who want to better remember in formation in a variety of situations , especially work.In every day we presented with hundreds & instruction , participating in training or other learning situations , involved in project discussions discussions or talking one - on - one with our boss , customer or colleague , good memory skills enhance our professional image & increase productivity
Category: Books » Business Promotions
Uploaded: 21-Jun-2011
0 40 5.71 MB  
Hacker High School Lesson 12
New technologies, while building a new paradigm that invades every human activity, also influence the dark side of these activities: criminal behavior of individuals and of organized groups. For this reason, we have reserved the last lesson of HHS to analyze some aspects related to Legality and Ethics, analyzing several behaviors that could end in crimes and the consequences of these crimes.
Category: Books » Computer Science
Uploaded: 21-Jun-2011
0 35 289.5 KB  
Hacker High School Lesson 11
One of the principal characters in The Matrix Reloaded is the Keymaker. The Keymaker is critically important; he is protected by the Matrix and sought by Neo, because he makes and holds the keys to the various parts of the Matrix. The Matrix is a computer generated world; the keys he makes are passwords. Within the movie, he has general passwords, back door passwords and master keys – passwords to everywhere.
Category: Books » Computer Science
Uploaded: 21-Jun-2011
0 18 212 KB  
Hacker High School Lesson 10
What you do on the World Wide Web is your business. Or so you would think. But it's just not true. What you do on the web is about as private and anonymous as where you go when you leave the house. Again, you would think that it's your business and many, including ISECOM, would agree with you. However, consider a private investigator following you around town, writing down what you saw and who you spoke with.
Category: Books » Computer Science
Uploaded: 21-Jun-2011
0 12 727.1 KB  
Hacker High School Lesson 9
Everyone uses e-mail. It is the second most used application on the internet next to your web browser. But what you might not realize is that a significant portion of network attacks and compromises originate through e-mail. And with respect to your privacy, misuse of e-mail has the potential to disclose either the contents of your message, or give a spammer information about you. The purpose of this module is to give you information on how e-mail works, safe email usage, e-mail based attacks, and se
Category: Books » Computer Science
Uploaded: 21-Jun-2011
0 18 530.8 KB  
Hacker High School Lesson 8
Forensics concerns the application of a methodical investigation technique in order to reconstruct a sequence of events. Most people are now familiar with the concept of forensics from TV and films, “CSI ( Crime Scene Investigation )” being one of the most popular. Forensic science was for a long time – and still is really – most associated with Forensic Pathology – finding out how people died.
Category: Books » Computer Science
Uploaded: 21-Jun-2011
0 17 319.8 KB  
Hacker High School Lesson 7
There are a lot of programs on your computer that will want to open up network connections. Some of these programs have valid reasons for connecting (your web browser won't work nearly as well without access to a network connection as it will with one), others have been written by people with motives ranging from questionable to criminal. If you want to protect your computer, you'll have to learn how to detect network access, and identify the source and intent.
Category: Books » Computer Science
Uploaded: 21-Jun-2011
0 16 318.4 KB  
Hacker High School Lesson 6
“Malware” are programs or parts of programs that have a malicious ( “Mal” ) or unpleasant effect on your computer security. This covers many different terms that you may have heard before, such as “Virus”, “Worm” and “Trojan” and possibly a few that you haven't like “Rootkit”, “Logicbomb” and “Spyware”. This lesson will introduce, define and explain each of these subdivisions of malware, will give you examples, and will explain some of the countermeasures that can be put
Category: Books » Computer Science
Uploaded: 21-Jun-2011
0 20 207.9 KB  
Hacker High School Lesson 5
It is obvious that someone who sits down at the keyboard of your computer can gather information about it, including the operating system and the programs that are running, but it is also possible for someone to use a network connection to gather information about a remote computer. This lesson will describe some of the ways in which that information can be gathered. Knowing how this information is gathered will help you to ensure that your local computer is safe from these activities.
Category: Books » Computer Science
Uploaded: 21-Jun-2011
0 54 236.9 KB  
MIND AND MEMORY TRAINING
IMAGINE yourself to be standing with a party of friends in some Oriental market-place, or in a palace garden. Enter, a conjurer with a magic box. The strange man spreads a square of cloth upon the ground, then reverently places upon it a coloured box of basket-work, perhaps eight inches square. He gazes at it steadily, mutters a little, removes the lid, and takes out of it, one by one, with exquisite care, nine more boxes, which seem to be of the same size as the original one, but are of different colours.
Category: Books » Self Improvement
Uploaded: 11-Jun-2011
0 96 1.06 MB  
How To Cheat In Photoshop Elements 9
Discover the magic of Adobe’s best kept secret
Category: Books » Computer Science
Uploaded: 11-Jun-2011
0 44 34.59 MB  
Total Items: 1050,   Total Pages: 70
Pages : 1234567... 70