Cover Book Actions
Third Rainbow - J M K McMullen

Third RainbowJ M K McMullen

Average wait: N/A

Beta Masterson is having trouble sleeping. So much so that he can barely function in his waking life. The firewall program he designed to keep his nightmares at bay isn’t working anymore, and the demons that haunt his bad dreams have begu… more

Third Rainbow
J M K McMullen
J M K McMullen , English
Flawless Computing:How To Ke... - John Bridges

Flawless Computing:How To Ke...John Bridges

I told my wife “you cannot hurt this machine.” I was talking about our home machine, and she was nervous,  because she knows I use that machine for work, and she is a novice.  She believes me now, because it is true.  My granddaughter play… more

Flawless Computing:How To Keep Your Computer Working Perfectly
John Bridges
AuthorHouse , English
The Essential Guide to Inter... - Michael Nickle

The Essential Guide to Inter...Michael Nickle

Average wait: N/A

Computer security is a complex topic, especially for those who aren’t IT professionals. This book offers a clear and easy-to-understand approach to Windows security risks and attacks for PC users. By boiling down the topic to just the esse… more

The Essential Guide to Internet Security for Windows 7 & Windows XP
Michael Nickle
Intrusion Prevention and Act... - Michael Rash, Angela Orebaug...

Intrusion Prevention and Act...Michael Rash, Angela Orebaug...

This book provides an introduction to the field of Intrusion Prevention and provides detailed information on various IPS methods and technologies. Specific methods are covered in depth, including both network and host IPS and response techn… more

Intrusion Prevention and Active Response: Deploying Network and Host IPS
Michael Rash, Angela Orebaugh, Graham Clark
Syngress , English
Take Control of Sharing File... - Glenn Fleishman

Take Control of Sharing File...Glenn Fleishman

This detail-packed book makes file sharing easy, whether it’s between two Macs on a local network, among a mixed-platform office workgroup, or between far-flung computers on the Internet. You’ll get help with selecting and configuring the r… more

Take Control of Sharing Files in Snow Leopard
Glenn Fleishman
TidBITS Publishing, Inc. , English
Emergency Responder Communic... - Brian Walsh

Emergency Responder Communic...Brian Walsh

Average wait: N/A

As a professional emergency responder you are well trained to handle an extensive array of crises. Your tense and stressful work environment can cause depersonalization of casualties and victims, with potentially negative consequences.

Th… more

Emergency Responder Communication Skills Handbook: How Your Words and Actions Affect People in Medical Distress
Brian Walsh
Walsh Seminars , English
Critical Safety Measures For... - Todd M. Wright

Critical Safety Measures For...Todd M. Wright

The internet is a haven for many forms of risks and hazards. There is the never-ending danger of identity fraud. There is the threat of viruses and other deliberately harmful malwares that can cause data loss. How can you feel safe while us… more

Critical Safety Measures For Your Computer: The Ultimate Collection Of Computer Protection Tips For Data Recovery And Virus Protection For Your Laptop … Of Mind From Other Internet Security Threats
Todd M. Wright
The Law Of Repulsion!: for w... - Robert Loxley

The Law Of Repulsion!: for w...Robert Loxley

Average wait: N/A

The Law Of Repulsion; For when the Law of Attraction seems to work in reverse, A Sorcerers perspective!

Manifest Like A Sorcerer!

Do you find LOA (Law of Attraction) and manifestation techniques you attempt produce opposite effects to the… more

The Law Of Repulsion!: for when the Law of Attraction seems to work in reverse. A Sorcerers Perspective!
Robert Loxley
Electronic Pulp Books , English
Children of the Great Reckon... - K.B. Nelson

Children of the Great Reckon...K.B. Nelson

Average wait: N/A

Welcome to a world controlled by the great Spirit and Science Margas, a world that has crawled out of years of devastating viral plagues only to find that the immuno-nanotech sentinels meant to protect and enhance a whole generation of chil… more

Children of the Great Reckoning, Firewall, Book 1
K.B. Nelson
Karunajoyti Publications , English
Hacker: The Outlaw Chronicles - Ted Dekker

Hacker: The Outlaw ChroniclesTed Dekker

Average wait: 52d, 0h

My name is Nyah and I’m a hacker. I know things most people would never believe. Things that shouldn’t exist, but do.

Seventeen year old Nyah Parks is a genius hacker who makes a living by cracking the firewalls of the world’s largest cor… more

Hacker: The Outlaw Chronicles
Ted Dekker
Outlaw Studios , English
Book Of Poetry: Haiku Poetry... - James Moore

Book Of Poetry: Haiku Poetry...James Moore

Experience Haiku through the eyes of an African American male from the city of Chicago. Get an urban spin on the traditional Japanese style of poetry as he sees it. Complete with 18 poems this book includes: My WifeDeadly SinFirewallDepres… more

Book Of Poetry: Haiku Poetry (2nd Edition)
James Moore
Firewall Hacking Secrets For... - Timur Mehmet

Firewall Hacking Secrets For...Timur Mehmet

Average wait: N/A

Firewall hacking secrets for security professionals enables both penetration testers and security professionals to plan and execute better testing of firewalls.

Unlike most ‘hacking’ books, we discuss all aspects of testing a firewall cove… more

Firewall Hacking Secrets For Security Professionals (HackerStorm Penetration Testing Guides Book 1)
Timur Mehmet
HackerStorm.com Publishing , English
Fighting Lady Jayne - Michelle M. Pillow

Fighting Lady JayneMichelle M. Pillow

The second Divinity Warriors book, set in the Divinity Universe.Jayne Hart has earned her independence by becoming Divinity Corporation’s inter-dimensional boxing champion. Life is great, until a dirty fighter knocks her unconscious. Now, a… more

Fighting Lady Jayne
Michelle M. Pillow
Ellora’s Cave , English
Fighting Lady Jayne (Divinit... - Michelle M. Pillow

Fighting Lady Jayne (Divinit...Michelle M. Pillow

2 ratings

Divinity Warriors 2: Fighting Lady JayneSeries One of the Divinity UniverseAlternate Reality Romance / Parallel UniverseJayne Hart has earned her independence by becoming Divinity Corporation’s inter-dimensional boxing champion. Life is gre… more

Fighting Lady Jayne (Divinity Warriors Book 2)
Michelle M. Pillow
The Raven Books , English
All About Spam Protecteion ! - Alexander Marriot

All About Spam Protecteion !Alexander Marriot

Essential: All About Spam ProtectionA collection of selected reports - A Brief History of Spam Top 10 Techniques to Protect Yourself From Spam Top Ten Tricks of the Spammer What Can an Anti spam Firewall Do For You … more

All About Spam Protecteion !
Alexander Marriot
Cisco ASA and PIX Firewall Handbook - David Hucaby

Cisco ASA and PIX Firewall HandbookDavid Hucaby

The complete guide to the most popular Cisco PIX®, ASA, FWSM, and IOS® firewall security features Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspect… more

Cisco ASA and PIX Firewall Handbook
David Hucaby
Cisco Press , English
Appearances: Genetic Mytholo... - Laurie McRobert

Appearances: Genetic Mytholo...Laurie McRobert

Average wait: N/A

In Appearances: Genetic Mythology and Cosmic Instincts Laurie McRobert argues that the theoretical physicists’ concepts of the cosmos need to be replaced by a biological cosmology. This revolutionary perspective brings with it the claim tha… more

Appearances: Genetic Mythology and Cosmic Instincts
Laurie McRobert
Createspace , English
Deploying Microsoft Forefron... - Yuri Diogenes, Dr Thomas W. Shinder

Deploying Microsoft Forefron...Yuri Diogenes, Dr Thomas W. Shinder

Get the focused, scenario-based guidance you need to plan and deploy Forefront Threat Management Gateway (TMG) as your network perimeter firewall. The evolution of Microsoft ISA Server, Forefront TMG provides multiple layers of continuously… more

Deploying Microsoft Forefront Threat Management Gateway 2010
Yuri Diogenes, Dr Thomas W. Shinder
Microsoft Press , English
Security Awareness: Applying... - Mark Ciampa

Security Awareness: Applying...Mark Ciampa

For most students and computer users, practical computer security poses some daunting challenges: What type of attacks will antivirus software prevent? How do I set up a firewall? How can I test my computer to be sure that attackers cannot … more

Security Awareness: Applying Practical Security in Your World
Mark Ciampa
Cengage Learning , English
Configuring SonicWALL Firewalls - Chris Lathem, Benjamin W. Fo...

Configuring SonicWALL FirewallsChris Lathem, Benjamin W. Fo...

SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. The SonicWALL firewall appliance has had the largest annua… more

Configuring SonicWALL Firewalls
Chris Lathem, Benjamin W. Fortenberry, Joshua Reed, Kevin Lynn, Daniel H. Bendell
Syngress , English