e99 Online Shopping Mall

Geometry.Net - the online learning center Help  
Home  - Basic S - Spam Email (Books)

  Back | 81-100 of 100
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

click price to see details     click image to enlarge     click link to go to the store

 
$5.95
81. Devilish downloads: how to exorcise
 
$5.95
82. Paying the price for spam. (Tech
 
$5.95
83. Spam busting: Peter Croft presents
 
$5.95
84. ENGATE ANTI-SPAM PROTECTION ADAPTS
85. Million Dollar Emails--The Greatest
86. Spam Stopper
 
$5.95
87. Businesses, ISPs in 'trench warfare'
 
$9.95
88. Canning spam: park region telephone
$61.00
89. Managing Spam Through Mapping
$4.95
90. How To Avoid Spam in Your E-Mail:
$12.21
91. You've Got Spam! A Refreshing
$10.95
92. Economics of first-contact email
$150.00
93. Spam Blocking Agent 1.0
 
$5.95
94. STOP VIRUSES WHILE ELIMINATING
95. Spam
 
$195.00
96. Complying with Can-Spam: Optimizing
 
$9.95
97. Sleeping with the phishes: filters
 
$5.95
98. Business Wire : Qurb 3.0 Software
99. No Spam, Just Sales :The Techniques
$0.01
100. Bug-Free Computing: Stop Viruses,

81. Devilish downloads: how to exorcise pop-ups, spam, and more.(SOHO ADVISOR): An article from: Computer User
 Digital: 3 Pages (2004-11-01)
list price: US$5.95 -- used & new: US$5.95
(price subject to change: see help)
Asin: B0009GNY9O
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
This digital document is an article from Computer User, published by MSP Communications on November 1, 2004. The length of the article is 863 words. The page length shown above is based on a typical 300-word page. The article is delivered in HTML format and is available in your Amazon.com Digital Locker immediately after purchase. You can view it with any web browser.

Citation Details
Title: Devilish downloads: how to exorcise pop-ups, spam, and more.(SOHO ADVISOR)
Publication: Computer User (Magazine/Journal)
Date: November 1, 2004
Publisher: MSP Communications
Volume: 22Issue: 11Page: 26(1)

Distributed by Thomson Gale ... Read more


82. Paying the price for spam. (Tech Talk).: An article from: Security Management
by Peter Piazza
 Digital: 2 Pages (2003-04-01)
list price: US$5.95 -- used & new: US$5.95
(price subject to change: see help)
Asin: B0008DC7QY
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
This digital document is an article from Security Management, published by American Society for Industrial Security on April 1, 2003. The length of the article is 513 words. The page length shown above is based on a typical 300-word page. The article is delivered in HTML format and is available in your Amazon.com Digital Locker immediately after purchase. You can view it with any web browser.

Citation Details
Title: Paying the price for spam. (Tech Talk).
Author: Peter Piazza
Publication: Security Management (Refereed)
Date: April 1, 2003
Publisher: American Society for Industrial Security
Volume: 47Issue: 4Page: 41(1)

Distributed by Thomson Gale ... Read more


83. Spam busting: Peter Croft presents a good practice guide to identifying and preventing spam.(tech biz): An article from: NZ Business
by Peter Croft
 Digital: 3 Pages (2005-11-01)
list price: US$5.95 -- used & new: US$5.95
(price subject to change: see help)
Asin: B000CDGY64
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
This digital document is an article from NZ Business, published by Thomson Gale on November 1, 2005. The length of the article is 808 words. The page length shown above is based on a typical 300-word page. The article is delivered in HTML format and is available in your Amazon.com Digital Locker immediately after purchase. You can view it with any web browser.

Citation Details
Title: Spam busting: Peter Croft presents a good practice guide to identifying and preventing spam.(tech biz)
Author: Peter Croft
Publication: NZ Business (Magazine/Journal)
Date: November 1, 2005
Publisher: Thomson Gale
Volume: 19Issue: 10Page: 50(2)

Distributed by Thomson Gale ... Read more


84. ENGATE ANTI-SPAM PROTECTION ADAPTS TO CABLE MODEMS.: An article from: Modem User News
 Digital: 3 Pages (2005-10-01)
list price: US$5.95 -- used & new: US$5.95
(price subject to change: see help)
Asin: B000BHS978
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
This digital document is an article from Modem User News, published by Thomson Gale on October 1, 2005. The length of the article is 631 words. The page length shown above is based on a typical 300-word page. The article is delivered in HTML format and is available in your Amazon.com Digital Locker immediately after purchase. You can view it with any web browser.

Citation Details
Title: ENGATE ANTI-SPAM PROTECTION ADAPTS TO CABLE MODEMS.
Publication: Modem User News (Newsletter)
Date: October 1, 2005
Publisher: Thomson Gale
Volume: 17Issue: 10Page: NA

Distributed by Thomson Gale ... Read more


85. Million Dollar Emails--The Greatest Moneymaking Emails of All Time
by Ebook Buddy
Kindle Edition: Pages (2010-06-08)
list price: US$4.99
Asin: B003QMKTFA
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Email Statistics:
1. Jupiter Communications reports that email marketing will become a $7.3 billion business by 2005
2. Over 50% of consumers will be communicating via email by 2001 according to Forrester Research. eMarketer reports that by year-end 2001, there will be 111 million email users.

Obviously with startling statics like this - email should be a major part of your online and off line marketing strategies.

Using Email

The power of email marketing is truly the "killer app" of the Internet. It is totally revolutionzing direct marketing.

Just by sending out a simple email - you have the power to create cash on demand. Imagine, anytime you need money, you just hit SEND!

The Truth About "Opt-in" and "Permission" Email Marketing

If you've been on the Net for anytime, I'm sure you've heard of spam. That's the name for unsolicited commercial email. Mostly the kind of "get rich quick" and "send me a dollar" pyramid schemes that find their way into your inbox. Many short-term minded marketers feel that since email is practically free they can send out thousands and thousands of emails hoping for a handful of sales while dealing with the risks involved. I don't think that's a good idea.

You see, there is a big difference between permission email marketing and spamming. I'm not talking about using software that can harvest emails addresses from the Web or even those CD-roms with "10 million email addresses" floating around. The fact is, without getting permission you are just sending out spam and that will land you in some big trouble. I've seen sites shutdown, ISP's canceled and people basically being "blackballed" from the Internet community. Trust me, it's not pretty.

In fact, there is new legislation pending that will make spamming illegal. So not only will you have all kinds of angry prospects - but you could also end up with sever penalties against you.

Why would you want to put yourself through any of that?

There's no point because getting permission is easy once you start using the strategies I'll tell you about in a moment, plus it produces better results.

Included in this ebook:

7 Ways to Collect Email Addresses Online and Off line;
Managing Your List;
Tips for Creating Your Winning Email;
Important Particulars;
Getting Your Emails Opened and Read;
Email Copy Tips;
Profitable Ideas of How to Use Email Marketing;
Acquiring New Customers and Subscribers Samples;
Customer Email Samples;
Endorsement Email Samples;
Joint Venture Email Proposals;
and more... ... Read more


86. Spam Stopper
Kindle Edition: Pages (2010-09-08)
list price: US$2.99
Asin: B0042FZQ7G
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Here's what's inside:

*Understand what Spam is and what Spam isn't

*Learn how your email address is often collected by spammers - often with your consent

*Realize that clicking a link that promises you will be taken off of their mailing list is really just a waste of time... and may do more harm then good

*Discover the best method currently available for stopping Spam dead in its tracks

*Why innocent "Chain Letters" are often tools used by Spammers to get you and your friend's email addresses

*Learn a simple trick that can help you misdirect Spammers

*Find out which files on your computer that you should get rid of regularly

*How using the word "at" in certain instances can save you from getting on Spammers' email lists

*Understand why contests are often the hidden culprit responsible for stealing your email address for Spammers - and what you can do to stop this

*and a whole lot more...
... Read more


87. Businesses, ISPs in 'trench warfare' on spam.(Technology)(Internet service providers battle e-mail)(Brief Article): An article from: Arkansas Business
by Carl D. Holcombe
 Digital: 7 Pages (2003-07-21)
list price: US$5.95 -- used & new: US$5.95
(price subject to change: see help)
Asin: B0008DYHTE
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
This digital document is an article from Arkansas Business, published by Journal Publishing, Inc. on July 21, 2003. The length of the article is 2025 words. The page length shown above is based on a typical 300-word page. The article is delivered in HTML format and is available in your Amazon.com Digital Locker immediately after purchase. You can view it with any web browser.

Citation Details
Title: Businesses, ISPs in 'trench warfare' on spam.(Technology)(Internet service providers battle e-mail)(Brief Article)
Author: Carl D. Holcombe
Publication: Arkansas Business (Magazine/Journal)
Date: July 21, 2003
Publisher: Journal Publishing, Inc.
Volume: 20Issue: 29Page: 1(4)

Article Type: Brief Article

Distributed by Thomson Gale ... Read more


88. Canning spam: park region telephone combats unwanted e-mails.: An article from: The Exchange
by Jonah Arellano
 Digital: 2 Pages (2007-10-01)
list price: US$9.95 -- used & new: US$9.95
(price subject to change: see help)
Asin: B000ZIKPGQ
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
This digital document is an article from The Exchange, published by Thomson Gale on October 1, 2007. The length of the article is 534 words. The page length shown above is based on a typical 300-word page. The article is delivered in HTML format and is available in your Amazon.com Digital Locker immediately after purchase. You can view it with any web browser.

Citation Details
Title: Canning spam: park region telephone combats unwanted e-mails.
Author: Jonah Arellano
Publication: The Exchange (Newsletter)
Date: October 1, 2007
Publisher: Thomson Gale
Volume: 26Issue: 5Page: 7(1)

Distributed by Thomson Gale ... Read more


89. Managing Spam Through Mapping Anti-Spam Software to E-Mail Policy
by Stein Mkandawire
Paperback: 92 Pages (2010-04-19)
list price: US$66.00 -- used & new: US$61.00
(price subject to change: see help)
Asin: 3838355466
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
The emergence of unsolicited commercial electronicmail (UCE) also known as spam in 1978 has become abig global problem. What is being experienced nowis that the numbers of unsolicited commercialelectronic mails are increasing each year. Withincreasing number of spam e-mails, organizationsand nations are making efforts to evolve strategiesto manage the scourge. In this book Mkandawire Stein looks at designing a framework for eveluating the performance of anti-spam software tools with the major aim of mapping the anti-spam software functionalities to the e-mail acceptable use policy (eaup) in order to reduce spam on Exchange Server 2003. The book begins with an overview of what e-mail is and its attributes, covering the history of Spam and the impact of spam on organizations.New in this edition Importance of training e-mail users Definitions of e-mail and e-mail spam Origins of spam This book's approach to spam management Mapping strategies Mkandawire Stein O.C. is the Head Computer and Communications Network in the Univeristy Computer Centre Department of the Copperbelt University, Zambia. ... Read more


90. How To Avoid Spam in Your E-Mail: Some Guidelines to Prevent Spam
by Quick Easy Guides
Paperback: 32 Pages (2008-07-31)
list price: US$4.95 -- used & new: US$4.95
(price subject to change: see help)
Asin: 1606808192
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Spam is the unwanted propaganda you receive in your e-mail address. It is one of the most annoying problems today, but it can be easily avoided.

Written by experts in the field, Quick Easy Guides share little-known trade secrets and helpful hints to get you moving in the right direction.

Quick Easy Guides gives you books you can judge by the cover. Our books are short, sweet and cheap. You can see for yourself.

We specialize in publishing books in the following categories: Business, Marketing, Careers & Work, Consumer Tips, Finance & Real Estate, Computers & Internet, Electronics, Cars & Auto, Hobbies, Food & Drink, Education, Health & Safety, Sports & Fitness, Fashion & Personal Care, Religion & Spirituality, Family & Relationships, Home & Garden, Pets & Animals, Holidays & Festivals, Travel.

Quick Easy Guides -- helping people achieve success and happiness.

http://www.quickeasyguides.com ... Read more


91. You've Got Spam! A Refreshing Collection of E-mails Regarding Mercy Ministry - Volume One
by Tim Van Arsdale
Paperback: 108 Pages (2008-07-25)
list price: US$12.95 -- used & new: US$12.21
(price subject to change: see help)
Asin: 1601455674
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
You've Got Spam! is a refreshing collection of 37 e-mails regarding a café mercy ministry in Medina, Ohio. It's basically "spiritual" spam. These e-mail stories are absolutely true. They will inspire, encourage, and strengthen your faith in God. ... Read more


92. Economics of first-contact email advertising [An article from: Decision Support Systems]
by R.D. Gopal, A.K. Tripathi, Z.D. Walter
Digital: 16 Pages (2006-12-01)
list price: US$10.95 -- used & new: US$10.95
(price subject to change: see help)
Asin: B000PBZWAM
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
This digital document is a journal article from Decision Support Systems, published by Elsevier in 2006. The article is delivered in HTML format and is available in your Amazon.com Media Library immediately after purchase. You can view it with any web browser.

Description:
Since the advent of the Internet, email has emerged as an important new form of personal communication. The focus of this research is on commercial advertising through the email channel. We analyze the underlying economics of a business model termed admediation that facilitates effective first-contact email advertising. Admediary is a trusted third party that facilitates a mutually desirable communication between buyers and sellers via email, and operates under the 'opt-in' mode widely supported by the consumer advocacy groups. Our analytical model examines the incentive structures for all participating entities, and derives pricing strategies, profit implications and characteristics of the email lists. We develop and model a form of price discrimination we term sequential elimination price discrimination that can be practiced via email. Our results indicate that the transactions facilitated by the admediary can create significant value whereby every participating entity realizes increased benefits. These findings underscore the potential of admediation to restore email as an effective communication media for online advertising. ... Read more


93. Spam Blocking Agent 1.0
by Marc E Gracieux, Claire J. Gracieux
CD-ROM: 37 Pages (2005-01)
list price: US$150.00 -- used & new: US$150.00
(price subject to change: see help)
Asin: 097640320X
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Install and run your own email server step by step(software included). The application software processes incoming mails from mail server such as IMS to eradicate spam at the server side therefore freeing the client mail from any spam. The mail administrator sets each mail account to a STF (Spam Tolerance Factor) that determines the number of spam this account can accept before shutting the sender off.AN STF of 0 will automatically block all mail sender that is not in the BuddyList. The Buddy List is auto-created for each mail sent by the user.The SpamList is also autocreated.Automatic removal from SpamList is done upon sending email to recipient from SpamList.

The program allows the mail admin to set multiple mail domains in one Windows NT or 2000 platform.

This version of SBA works with IMS which is automatically downloaded by choosing FULL SETUP from the MENU INSTALLATION.

Some Features of SBA:
. Filters email
. Blocks spam
. Retrieves all important spam info
. Creates Trusted Domains
. Creates Buddy List
. Creates Multiple Domains
. Can set unique name for different domains in the same server
. Displays Real Time Mail Server Activities
. Personalize accounts by department or profession ... Read more


94. STOP VIRUSES WHILE ELIMINATING SPAM.(Product Announcement): An article from: GUI Program News
 Digital: 2 Pages (2001-03-01)
list price: US$5.95 -- used & new: US$5.95
(price subject to change: see help)
Asin: B0008HMIRI
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
This digital document is an article from GUI Program News, published by Worldwide Videotex on March 1, 2001. The length of the article is 478 words. The page length shown above is based on a typical 300-word page. The article is delivered in HTML format and is available in your Amazon.com Digital Locker immediately after purchase. You can view it with any web browser.

Citation Details
Title: STOP VIRUSES WHILE ELIMINATING SPAM.(Product Announcement)
Publication: GUI Program News (Newsletter)
Date: March 1, 2001
Publisher: Worldwide Videotex
Volume: 12Issue: 3Page: NA

Article Type: Product Announcement

Distributed by Thomson Gale ... Read more


95. Spam
by Paul Mann
Kindle Edition: Pages (2008-05-07)
list price: US$1.80
Asin: B003V8BHXC
Average Customer Review: 4.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Edwin, a socially awkward college student and quintessential computer nerd, has an experience with Spam that is truly out of this world. His unusual adventure with an annoying Spam E-mail leads him to reassess his take on computers and life in general. ... Read more

Customer Reviews (1)

4-0 out of 5 stars I'll never look at spam the same way again
What a quirky little story. Spam can certainly be a nightmare for any avid pc user, but this story really puts the mare into nightmare.
Worth a read, and I look forward to other stories from this author. ... Read more


96. Complying with Can-Spam: Optimizing E-mail Practices to Mitigate Risks
by David Daniels
 Digital: 4 Pages (2004-03-09)
list price: US$195.00 -- used & new: US$195.00
(price subject to change: see help)
Asin: B0006IONYK
Canada | United Kingdom | Germany | France | Japan

97. Sleeping with the phishes: filters kill spam and unauthenticated email.: An article from: The Non-profit Times
by Craig Causer
 Digital: Pages (2006-02-15)
list price: US$9.95 -- used & new: US$9.95
(price subject to change: see help)
Asin: B000I2K6WM
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
This digital document is an article from The Non-profit Times, published by Thomson Gale on February 15, 2006. The length of the article is 1547 words. The page length shown above is based on a typical 300-word page. The article is delivered in HTML format and is available in your Amazon.com Digital Locker immediately after purchase. You can view it with any web browser.

Citation Details
Title: Sleeping with the phishes: filters kill spam and unauthenticated email.
Author: Craig Causer
Publication: The Non-profit Times (Magazine/Journal)
Date: February 15, 2006
Publisher: Thomson Gale
Volume: 20Issue: 4Page: 1(2)

Distributed by Thomson Gale ... Read more


98. Business Wire : Qurb 3.0 Software Makes E-mail Better; Award-winning Anti-Spam Software Stops Phishing Scams and E-mail Fraud, Blocks All Spam and Searches E-mail Instantly.
 Digital: 4 Pages
list price: US$5.95 -- used & new: US$5.95
(price subject to change: see help)
Asin: B0007UUWEM
Average Customer Review: 1.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan

Customer Reviews (1)

1-0 out of 5 stars Review of the Review
This is an article from a February 2005 magazine which reviewed "Qurb" software.It appears that you might be purchasing the software, but it is only a 960 word copy of the 2-1/2 year old article.This has absolutely no value.If you are interested in Qurb, as I was, and you find any site selling it, you will get all this information including the features which have been added in the 2-1/2 years since this was written. I was totally discouraged that Amazon would "Sell" a reprint of an old magazine article. If you want to give away six bucks, put it in the the plate at chuch next week.You'll feel good about it.Buying this will only make you feel bad that a good company would list and sell anything so totally devoid of value. ... Read more


99. No Spam, Just Sales :The Techniques of Creating and Using Effective Email Advertisements
by Alfred Anderson
Kindle Edition: Pages (2010-08-10)
list price: US$9.99
Asin: B003Z4K9VS
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
If you are interested in making more money from your business, one of the best advertising techniques in the marketing industry is the use of email.Quickly becoming one of the fastest ways to saturate your target audience group with updated information, email is a mainstay of online marketing.This book will teach you how to create email messages that get results, how to format your email to get attention and how to use the powerful money making system that has worked for many online millionaires.Get your copy now.You owe it to yourself. ... Read more


100. Bug-Free Computing: Stop Viruses, Squash Worms, and Smash Trojan Horses
by Ken Dwight
Paperback: 186 Pages (2006-07-31)
list price: US$19.95 -- used & new: US$0.01
(price subject to change: see help)
Asin: 0975408542
Average Customer Review: 4.5 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
In Bug-Free Computing you will discover simple techniques anyone can use to protect their computer against attacks from viruses, worms, Trojan horses, spyware and more. Unless you know enough to stay ahead of these threats, you are at risk. ... Read more

Customer Reviews (5)

3-0 out of 5 stars Superficial and a bit outdated
At the end of 2008, be aware that this book is a bit outdated in his content.

5-0 out of 5 stars Great computer book helps the average user get after threats to their computer!
Bug-Free Computing, by Ken Dwight, who calls himself "The Virus Doctor," is a book that could be very important to business people who depend on their computers to make a living and worry about a virus or other malevolent software designed to attack a computer and bring it down.

If this concerns you, but you have no real idea how to deal with it, Dwight's book is a solid primer designed for the average computer user. You don't have to be a geek to understand it, it's written in plain English, with a minimum of technical jargon. For example, in a chapter devoted to data backups, readers will be delighted to find information specifically tailored to the average user - what to back up, when, how, what media to use, what programs to use, etc.

Viruses are a primary focus of the book; most computer users are aware of viruses and their potential to do harm, but what many users don't understand, even technicians, is that viruses have changed greatly in the past few years in terms of virus behavior and distribution, so it's extremely important to keep up with and be aware of these differences.

Bug-Free Computing also discusses spyware, browser hijackers, keyloggers, spam, hoaxes, urban legends and other possible computer problems. You don't have to read the book cover-to-cover to get the help you need. The reader can take a look at the table of contents to discern the chapter that covers their most pressing concerns, and quickly flip to that chapter.

In addition, the text includes hyperlinks to various web sites and articles referenced in the book. If the reader desires more information than what is presented in Dwight's book, the links will provide more detail and even direct the reader to vendors of products mentioned in the book. Also, the information contained in the appendices is extremely helpful; the most useful is the ability to keep the information up-to-date from the Book Registration web site.

While the subject of programs that can damage your computer is a serious one, Dwight offers a light-hearted detour in the form of a section on hoaxes and urban legends. This section is good for a few chuckles before returning to the grim realities of dealing with computer problems.

Dwight's style is easy and disarming, making for a pleasant read, even for technophobes. For example, in the chapter on spam, he shows users how to read message headers and footers to find clues to the real identity of the sender and how to use filters to cut down on your spam email. He also explains that it's not a good idea to click on the "Remove Me" link that is included in some spam emails; that action could possibly increase your email rather than decrease it.

Ken Dwight's book is chock-full of common-sense pointers, making it an excellent choice for those who want to protect their computers without hiring expensive consultants.

5-0 out of 5 stars Not very technical, great for the person who wants to understand the problem and what to do
Title:Bug-Free Computing
Author:Ken Dwight
Publisher:The TeleProcessors, Inc.
14300 Cornerstone Village Drive, Suite 321
Houston, TX 77014-1276
Copyright: 2005
ISBN:0975408542
Pages:162 plus appendixes
Price:$19.95

If your computer is on and you are connected to the Internet then sooner or later it will become infected.These days you don't have to open attachments, download a file, or even surf the web to become infected; just being connected can make you a target.In his book Bug-Free Computing, Ken Dwight educates the reader about the history of the many threats to safe computing and what you can do to make your computer experience as safe as possible.Some of the information will be surprising to most people including the fact that most infections occur on a system that has anti-virus software installed.To keep bug-free he discusses anti-virus software, using a firewall, spam filtering, and a host of other techniques to increase your safety.And, of course he includes a section on what to do if you are already infected.Written in a very easy to understand style, Bug-Free Computing is highly recommended to the everyday user who wants to understand the computing environment and how to work on their computer without stressing about infections.

5-0 out of 5 stars Lucid explanation of PC bugs and solutions
Mr. Dwight draws on his 40 years of computer experience to present a lucid explanation of the inner workings of PC programs and how they are affected by viruses and other malicious programming.His technical explanations are easy to follow and understand, even for the novice PC user.His book has clear screen-shots of typical Windows options, and he carefully explains why and how to optimize Windows for maximum operating efficiency and security.His book is essential reading for anyone who has a PC connected to the Internet.I am an accomplished user, but I am not an expert, and I found his many hints and suggested settings to be excellent methods of improving my PC's protection.I purchased several copies to give to family and friends because I found his advice invaluable.

5-0 out of 5 stars Something everyone needs to know about our computers
This is a great book for anyone who has a computer.The book is arranged well, starting with an overview of computer viruses and how they originate, pass from machine to machine and work.It gives a brief insight as to the type of person who creates this havoc.

Most importantly, it gives us the information that we need to minimize our exposure to computer viruses and what to do if/when we get infected.I will definitely keep my virus and firewall protection up to date. ... Read more


  Back | 81-100 of 100
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

Prices listed on this site are subject to change without notice.
Questions on ordering or shipping? click here for help.

site stats