Description : Lessons for beginners cover entering and exiting applications, controlling hardware settings, file management, resource sharing, printing, working with graphics, and using Windows 2000 Professional's accessories.
Description : Highlights tips and shortcuts while explaining how to use the time and information management program to organize e-mail, schedule appointments, store addresses, and send and receive faxes
Description : Long gone are the days when a computer took up an entire room. Now we have computers at home, laptops that travel just about anywhere, and data networks that allow us to transmit information from virtually any location in a timely and efficient manner. What have these advancements brought us? Another arena for criminal activity. If someone wants to focus and target something, more than likely they will obtain what they want. We shouldn't expect it to be any different in cyberspace. Cyber Crime Field Handbook provides the details of investigating computer crime from soup to nuts. It covers everything from what to do upon arrival at the scene until the investigation is complete, including chain of evidence. You get easy access to information such as: Questions to ask the client Steps to follow when you arrive at the client's site Procedures for collecting evidence Details on how to use various evidence collection and analysis tools How to recover lost passwords or documents that are password protected Commonly asked questions with appropriate answers Recommended reference materials A case study to see the computer forensic tools in action Commonly used UNIX/Linux commands Port number references for various services and applications Computer forensic software tools commands synopsis Attack signatures Cisco PIX firewall commands We now have software and hardware to protect our data communication systems. We have laws that provide law enforcement more teeth to take a bite out of cyber crime. Now we need to combine understanding investigative techniques and technical knowledge of cyberspace. That's what this book does. Cyber Crime Field Handbook provides the investigative framework, a knowledge of how cyberspace really works, and the tools to investigate cyber crime...tools that tell you the who, where, what, when, why, and how.
Description : Demonstrates the latest version of the contact manager program and explains how to track sales opportunities, create a sales-oriented database, schedule meetings, and send and receive e-mail
Description : Shows how to use Photoshop Elements to retouch, repair, publish, and add effects to digital photographs and graphics by altering such factors as lighting, composition, and texture, and through editing, cropping, and filtering.
Description : This book speaks to the professional administrator who must set up, configure, maintain, and troubleshoot a multi-tasked network environment. Rob Kirkland attacks the technology at the professional level, with practical-hands-on assistance to get Domino 5 running.
Description : A guide to the latest version of the integrated software package explains how to organize documents and data, create Web pages, send email, and add special effects to business presentations
Description : A quick and easy tutorial that aids the user, step-by-step, through the most important features of Photoshop 4.0. The book divides the lessons into hours, making it possible to learn the information at a steady pace.