Internet Passport

Internet Passport

Author: Jonathan Kochmer

Publisher: Bellevue, Wash. : NorthWestNet : Northwest Academic Computing Consortium

Published: 1993

Total Pages: 556

ISBN-13:

DOWNLOAD EBOOK

Grade level: 4, 5, 6, 7, 8, 9, 10, 11, 12, e, i, s, t.


The Internet Encyclopedia, Volume 3 (P - Z)

The Internet Encyclopedia, Volume 3 (P - Z)

Author: Hossein Bidgoli

Publisher: John Wiley & Sons

Published: 2004-04-12

Total Pages: 979

ISBN-13: 0471689971

DOWNLOAD EBOOK

The Internet Encyclopedia in a 3-volume reference work on the internet as a business tool, IT platform, and communications and commerce medium.


PC Mag

PC Mag

Author:

Publisher:

Published: 1997-09-09

Total Pages: 452

ISBN-13:

DOWNLOAD EBOOK

PCMag.com is a leading authority on technology, delivering Labs-based, independent reviews of the latest products and services. Our expert industry analysis and practical solutions help you make better buying decisions and get more from technology.


Windows XP Pro

Windows XP Pro

Author: David Pogue

Publisher: "O'Reilly Media, Inc."

Published: 2003

Total Pages: 680

ISBN-13: 9780596003487

DOWNLOAD EBOOK

Windows XP represents the grand unification of two Microsoft dynasties: the corporate series (Windows NT and 2000) and the home series (Windows 95, 98, and Me). The result offers rock-solid stability and a modern new look -- but it still doesn't come with a printed manual. Book jacket.


A History of Cyber Security Attacks

A History of Cyber Security Attacks

Author: Bruce Middleton

Publisher: CRC Press

Published: 2017-07-28

Total Pages: 156

ISBN-13: 1351651900

DOWNLOAD EBOOK

Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable information or the latest intrusion of foreign governments in U.S. government and industrial sites, cyberattacks are now important. For professionals and the public, knowing how the attacks are launched and succeed is vital to ensuring cyber security. The book provides a concise summary in a historical context of the major global cyber security attacks since 1980. Each attack covered contains an overview of the incident in layman terms, followed by a technical details section, and culminating in a lessons learned and recommendations section.