Cover Book Actions

Third RainbowJ M K McMullen

Average wait: N/A

Beta Masterson is having trouble sleeping. So much so that he can barely function in his waking life. The firewall program he designed to keep his nightmares at bay isn’t working anymore, and the demons that haunt his bad dreams have begu… more

Third Rainbow
J M K McMullen
J M K McMullen , English

Flawless Computing:How To Ke...John Bridges

Average wait: N/A

I told my wife “you cannot hurt this machine.” I was talking about our home machine, and she was nervous,  because she knows I use that machine for work, and she is a novice.  She believes me now, because it is true.  My granddaughter play… more

Flawless Computing:How To Keep Your Computer Working Perfectly
John Bridges
AuthorHouse , English

Intrusion Prevention and Act...Michael Rash, Angela Orebaug...

This book provides an introduction to the field of Intrusion Prevention and provides detailed information on various IPS methods and technologies. Specific methods are covered in depth, including both network and host IPS and response techn… more

Intrusion Prevention and Active Response: Deploying Network and Host IPS
Michael Rash, Angela Orebaugh, Graham Clark
Syngress , English

The Essential Guide to Inter...Michael Nickle

Average wait: N/A

Computer security is a complex topic, especially for those who aren’t IT professionals. This book offers a clear and easy-to-understand approach to Windows security risks and attacks for PC users. By boiling down the topic to just the esse… more

The Essential Guide to Internet Security for Windows 7 & Windows XP
Michael Nickle

Emergency Responder Communic...Brian Walsh

As a professional emergency responder you are well trained to handle an extensive array of crises. Your tense and stressful work environment can cause depersonalization of casualties and victims, with potentially negative consequences. This… more

Emergency Responder Communication Skills Handbook: How Your Words and Actions Affect People in Medical Distress
Brian Walsh
Walsh Seminars , English

Take Control of Sharing File...Glenn Fleishman

This detail-packed book makes file sharing easy, whether it’s between two Macs on a local network, among a mixed-platform office workgroup, or between far-flung computers on the Internet. You’ll get help with selecting and configuring the r… more

Take Control of Sharing Files in Snow Leopard
Glenn Fleishman
TidBITS Publishing, Inc. , English

Firewall Hacking Secrets For...Timur Mehmet

Average wait: N/A

Firewall hacking secrets for security professionals enables both penetration testers and security professionals to plan and execute better testing of firewalls.

Unlike most ‘hacking’ books, we discuss all aspects of testing a firewall cove… more

Firewall Hacking Secrets For Security Professionals (HackerStorm Penetration Testing Guides)
Timur Mehmet
HackerStorm.com Publishing , English

Critical Safety Measures For...Todd M. Wright

The internet is a haven for many forms of risks and hazards. There is the never-ending danger of identity fraud. There is the threat of viruses and other deliberately harmful malwares that can cause data loss. How can you feel safe while us… more

Critical Safety Measures For Your Computer: The Ultimate Collection Of Computer Protection Tips For Data Recovery And Virus Protection For Your Laptop … Of Mind From Other Internet Security Threats
Todd M. Wright

Fighting Lady JayneMichelle M. Pillow

The second Divinity Warriors book, set in the Divinity Universe.Jayne Hart has earned her independence by becoming Divinity Corporation’s inter-dimensional boxing champion. Life is great, until a dirty fighter knocks her unconscious. Now, a… more

Fighting Lady Jayne
Michelle M. Pillow
Ellora’s Cave , English

Children of the Great Reckon...K.B. Nelson

Average wait: N/A

Welcome to a world controlled by the great Spirit and Science Margas, a world that has crawled out of years of devastating viral plagues only to find that the immuno-nanotech sentinels meant to protect and enhance a whole generation of chil… more

Children of the Great Reckoning, Firewall, Book 1
K.B. Nelson
Karunajoyti Publications , English

Book Of Poetry: Haiku Poetry...James Moore

Average wait: N/A

Experience Haiku through the eyes of an African American male from the city of Chicago. Get an urban spin on the traditional Japanese style of poetry as he sees it. Complete with 18 poems this book includes: My WifeDeadly SinFirewallDepres… more

Book Of Poetry: Haiku Poetry (2nd Edition)
James Moore

All About Spam Protecteion !Alexander Marriot

Essential: All About Spam ProtectionA collection of selected reports - A Brief History of Spam Top 10 Techniques to Protect Yourself From Spam Top Ten Tricks of the Spammer What Can an Anti spam Firewall Do For You … more

All About Spam Protecteion !
Alexander Marriot

Fighting Lady Jayne (Divinit...Michelle M. Pillow

2 ratings
Average wait: < 1h

Divinity Warriors 2: Fighting Lady JayneSeries One of the Divinity UniverseAlternate Reality Romance / Parallel UniverseJayne Hart has earned her independence by becoming Divinity Corporation’s inter-dimensional boxing champion. Life is gre… more

Fighting Lady Jayne (Divinity Warriors)
Michelle M. Pillow
The Raven Books , English

Cisco ASA and PIX Firewall HandbookDavid Hucaby

The complete guide to the most popular Cisco PIX®, ASA, FWSM, and IOS® firewall security features Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspect… more

Cisco ASA and PIX Firewall Handbook
David Hucaby
Cisco Press , English

Configuring SonicWALL FirewallsChris Lathem, Benjamin W. Fo...

SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. The SonicWALL firewall appliance has had the largest annua… more

Configuring SonicWALL Firewalls
Chris Lathem, Benjamin W. Fortenberry, Joshua Reed, Kevin Lynn, Daniel H. Bendell
Syngress , English

15 Steps To PC Securityakamai-ideas.com

15 Steps To PC Security - 68 pagesTable of ContentsStep One - How Secure is Your Home ComputerStep Two - All About VirusesStep Three - Password ProtectionStep Four - Back Up Important FilesStep Five - Should You Have a Firewall?Step Six - D… more

15 Steps To PC Security
akamai-ideas.com , English

Security Awareness: Applying...Mark Ciampa

For most students and computer users, practical computer security poses some daunting challenges: What type of attacks will antivirus software prevent? How do I set up a firewall? How can I test my computer to be sure that attackers cannot … more

Security Awareness: Applying Practical Security in Your World
Mark Ciampa
Cengage Learning , English

Deploying Microsoft Forefron...Yuri Diogenes, Dr Thomas W. Shinder

Get the focused, scenario-based guidance you need to plan and deploy Forefront Threat Management Gateway (TMG) as your network perimeter firewall. The evolution of Microsoft ISA Server, Forefront TMG provides multiple layers of continuously… more

Deploying Microsoft Forefront Threat Management Gateway 2010
Yuri Diogenes, Dr Thomas W. Shinder
Microsoft Press , English

Penetration Testing: Communi...Deborah Morley

The Security Analyst Series from EC-Council | Press is comprised of five books covering a broad base of topics in advanced penetration testing and information security analysis. The content of this program is designed to expose the reader t… more

Penetration Testing: Communication Media Testing, 1st Ed.: 4 (E/Csa)
Deborah Morley
Delmar Learning , English

Children of the Great Reckon...K.B. Nelson

Average wait: N/A

Sam Stelle is a being shackled on many levels—to a physical form that is not quite human;to the politically powerful Science Marga;to a lover who stands as a living firewall between the reality of humanity and the lands of a virtual reality… more

Children of the Great Reckoning: Architect
K.B. Nelson
Karunajoyti Publications , English