Shopping cart imageShopping Cart (0) Items

Computing & Internet > WWW & Internet

Page: 1 of 2 << < 1 2 > >>

An Introduction to Local SEO Tech-Critic
Books with a 0 star rating(0)
$12.95
Size: 5.06" x 7.81"
Binding: Perfect Bound
ASP.NET Tips & Tricks Sheo Narayan
Books with a 0 star rating(0)
$20.77
Size: 6" x 9"
Binding: Perfect Bound
Children and Cyber Security: Video Camera Devices, Social Networking Sites with Vulnerability to Cyber Crime Author Jennifer Lee Powers
Books with a 0 star rating(0)
$4.99
Size: 5" x 8"
Binding: Perfect Bound
ISBN: 9781946812858
Even with the world wide web open for the public to surf, there are ways in which we can protect ourselves from unwanted cyber trolling over the internet in especially gaming sites and video phones and video chat sites in which our children use for entertainment. I have listed several ways in which we can protect children from giving too much information out to opponents in chatting sites and account data.
Da Great Gatsby Kat Lee
Books with a 0 star rating(1)
$10.95
Size: 5.5" x 8.5"
Binding: Perfect Bound
A runaway parody initially made as an art piece, Da Great Gatsby is F. Right Back Up In Yo Muthafuckin Ass. Scott Fitzgerald's third book and a terrible object. It standz as tha supreme achievement of his game, an exemplary novel of tha Jazz Age n' our own.
Generation whY Kevin Jordan
Books with a 0 star rating(0)
$9.99
Size: 5.5" x 8.5"
Binding: Perfect Bound
Defining a generation is almost impossible. Motivating one is a completely different story. Stanford alumni and member of Generation Y, Kevin Jordan expresses some of the opinions and concerns of Generation Y. Covering issues as social media, pop culture, the Boston Bombing, President Barack Obama, the Constitution, racism, gay rights, immigration, gun rights and others, this book captures the voices of a generation that wants to be heard.
Healthcare Email Dangers Patrick Domingues
Books with a 0 star rating(0)
$12.95
Size: 6" x 9"
Binding: Perfect Bound
Every day, every single healthcare business is being targeted by hackers. Today hacking is a highly organized and lucrative crime. Using smart, automated tools constantly testing every business’s armor. Looking for just one tiny crack in their defenses, to let them get in. And their favorite access point is your email. Because with a little patience, and some smart thinking, your email can provide direct access to the contents of your healthcare business’s bank account. This book is an essential read for every healthcare business owner and practice manager. It uses the fictitious story of a healthcare business owner to explain complicated cyber security concepts in a w ...
Insider Keys to Winning The Social Media Race Ruby James
Books with a 0 star rating(0)
$12.99
Size: 5.5" x 8.5"
Binding: Perfect Bound
This book will provide a solid foundation to inform you on the necessity of what it takes to win the race of social media. Are you wondering what to do, and where to start? Then this book is for you. Every business is different, and therefore, each requires different networks and strategies. Yet some concepts are the same. This book will educate you on how to maximize social media by providing the basic yet vital steps and keys of social media. Many often wonder what they should post on social media, I’ve included a few ideas to get you started in no time. There is no need to be afraid of social media, but instead embrace and use it to your business advantage.
Internet History Trivia Elizabeth Gross
Books with a 0 star rating(0)
$4.15
Size: 4.25" x 6.87"
Binding: Perfect Bound
A volume full of facts and quotes about the beginnings of the internet and the people who created it.
JISSec Vol 8 Is 2 Gurpreet Dhillon
Books with a 0 star rating(0)
$19.99
Size: 5.5" x 8.5"
Binding: Perfect Bound
The Journal of Information System Security (JISSec) is a unique and innovative peer reviewed. The Journal views Information System Security in the broadest possible terms. While failure of technical systems and losses because of problems with technical control structures are clearly a cause of security breaches, the journal also considers misapplication of rules, inadequate policy formulations and other formal structural and administrative issues to be part of security. Besides, issues related to culture and regulatory controls are also considered relevant for publication in the journal. The JISSec mission is to significantly expand the domain of information system security research to a ...

Page: 1 of 2 << < 1 2 > >>