logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Computer Security For The Home And Small Office 1st Edition Thomas C Greene Auth

  • SKU: BELL-4491182
Computer Security For The Home And Small Office 1st Edition Thomas C Greene Auth
$ 31.00 $ 45.00 (-31%)

0.0

0 reviews

Computer Security For The Home And Small Office 1st Edition Thomas C Greene Auth instant download after payment.

Publisher: Apress
File Extension: PDF
File size: 17.18 MB
Pages: 406
Author: Thomas C. Greene (auth.)
ISBN: 9781430207115, 9781590593165, 1430207116, 1590593162
Language: English
Year: 2004
Edition: 1

Product desciption

Computer Security For The Home And Small Office 1st Edition Thomas C Greene Auth by Thomas C. Greene (auth.) 9781430207115, 9781590593165, 1430207116, 1590593162 instant download after payment.

Computer Security for the Home and Small Office addresses the long-neglected security needs of everyday users in the home, company workstation, and SOHO (small office/home office) categories, with emphasis on system hardening, eliminating malware, user and Internet privacy, encryption, and data hygiene.

The book offers comprehensive tutorials for protecting privacy, preventing system attacks and, most important, avoiding difficulties from buggy programs and software laced with hidden functions and networking capabilities.

Furthermore, the book is packed with information about open-source products with related security strategies for Windows users. One recurrent strategy: replacing insecure closed-source applications and utilities with safer open-source alternatives, thereby eliminating numerous routes to system exploitation and privacy invasion.

Also included is plenty of guidance for Linux users, and a full chapter weighing the advantages and disadvantages of migrating to Linux—a step that can greatly simplify computer security, even for the novice user.

Related Products