Anbieter: WeBuyBooks, Rossendale, LANCS, Vereinigtes Königreich
EUR 5,81
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbZustand: Good. Most items will be dispatched the same or the next working day. A copy that has been read but remains in clean condition. All of the pages are intact and the cover is intact and the spine may show signs of wear. The book may have minor markings which are not specifically mentioned. A tan to the pages. Annotations to some page edges/pages, may include notes, highlighting or underlining.
EUR 17,14
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbSoftcover. Zustand: Bon. Ancien livre de bibliothèque. Légères traces d'usure sur la couverture. Edition 2004. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Good. Former library book. Slight signs of wear on the cover. Edition 2004. Ammareal gives back up to 15% of this item's net price to charity organizations.
EUR 36,72
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. Thomas C. Greene is associate editor of The Register, the leading independent IT news daily, where he has been a senior editor and columnist for 5 years. Tom covers cybercrime, computer and network security, and Washington politics and legislation related t.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 39,84
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
EUR 46,55
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Neuware - Computer Security for the Home and Small Office addresses the long-neglected security needs of everyday users in the home, company workstation, and SOHO (small office/home office) categories, with emphasis on system hardening, eliminating malware, user and Internet privacy, encryption, and data hygiene. The book offers comprehensive tutorials for protecting privacy, preventing system attacks and, most important, avoiding difficulties from buggy programs and software laced with hidden functions and networking capabilities. Furthermore, the book is packed with information about open-source products with related security strategies for Windows users. One recurrent strategy: replacing insecure closed-source applications and utilities with safer open-source alternatives, thereby eliminating numerous routes to system exploitation and privacy invasion. Also included is plenty of guidance for Linux users, and a full chapter weighing the advantages and disadvantages of migrating to Linux-a step that can greatly simplify computer security, even for the novice user.