China-Pub computer books ranking by the latest week
Hot sale No. 1
Architectural Beauty (China-pub's exclusive national debut) (wisdom crystallization of 19 top architects worldwide)
Diomidis SPINELLIS; Georgios gousios
Market Price: ¥69.00
4-5 star price: ¥51.75No. 2
Virtualization and cloud computing
Virtualization and cloud computing team
Market Price: ¥45.00
4-5 star price: ¥33.75No. 3
The art of sof
Top 7 Sales of books on Internet computer channels (05.12-05.19)
1. hadoop authoritative guide (Chinese Version)
Media comment
"Congratulations, you have the opportunity to learn from the Masters About hadoop. While enjoying the technology, you can also appreciate the Masters' wisdom and their amazing writing style ."-- Doug cutting, founder of hadoop
Wonderful comments
I just received a short message
Top 7 Sales of books on Internet computer channels (07.09-07.15)
1. go deep into the Linux kernel architecture (the collective wisdom of the open-source community around the world, and appreciate the wonderful scenery of the Linux kernel)
Http://www.china-pub.com/196739
Try read address: http://www.china-pub.com/ureader/product.asp? Bookid = 1, 196739
Wonderful comments added this week:
It is worthy of favo
Top 7 Sales of books on Internet computer channels (06.17-06.23)
1. In-depth Linux kernel architecture (global open source community collective wisdom crystallization, appreciate the beautiful scenery of Linux kernel) http://www.china-pub.com/196739
Try read address: http://www.china-pub.com/computers/common/mianfeisd.asp? Id = 196739
Wonderful comments added this week:
I have just received a book today, an
Recommendation principles:It is better to be honest and never mix in the dregs (a good book may not be suitable for everyone, but it must be a good book for its target readers ).
Book selection principles:There are foreign ones, not domestic onesThere are original versions, not translatedView master's Works
It is best to read textbooks from abroad for computer books, because the classic textbooks are all fr
search of stupidity: over 20 years of high-tech marketing disastersNo. 31Godel, Escher, Bach: An eternal golden braidNo. 32Service-Oriented Architecture: a field guide to integrating XML and web servicesNo. 33Head first Java, 2nd EditionNo. 34Introduction to AlgorithmsIntroduction to algorithms, 2nd EditionNo. 35A first look at SQL Server 2005 for developersNo. 36Core Java 2, Volume 1: Fundamentals, 7th EditionNo. 37UML essence: Concise tutorial on Standard Object Modeling LanguageUML Distilled
Five computer security facts that surprised most people, computer security facts
The five computer security facts that surprised most people are the root cause of many computer
How to Prevent emails from being sent by only logging on to a specific email address on a computer and receiving emails on a computer to protect the security of computer filesSometimes we are considering computer file security. We
The stock market boom triggers computer security problems
Recently, as the stock market continued to hot, making more and more new investors into the stock market. According to the relevant department statistics, at present, every 13 Chinese people have 1 stocks, daily A-share account number added 300,000, China has entered the "all Shares" era. And the online stock market with its "convenient transaction,
password so that you do not forget it, but do not store the record in your computer. Do not save the password for the next login convenience; also, change the password frequently and do not disclose your password to anyone.
Email Security Guidelines
Do not open attachments in emails easily, or run programs in attachments unless you know the source of the information. Keep vigilance at all times. Do not tru
Press F8 at startup to go To the startup mode selection page and select safe mode.First recognized Security Mode
To enter safe mode, you only need to press f8. the option menu appears, and then select the upper/lower cursor on the keyboard to enter different startup modes. The options menu includes the following:
1. Security Mode
Use only basic files and drivers. Such as mouse (excluding USB serial mouse),
Author: Fresh sunshine (Http://hi.baidu.com/newcenturysun)Date: 2007/08/11 (reprinted please keep this statement)I. Personal Computer Security Status Quo Analysis1. virus killing anti-virus software is no longer a new thingSince the orange s in the S, the virus has been frantically infected with antivirus software. The cases of antivirus software being killed are not uncommon. The popular pandatv incense at
.
* Knowledge point: why can network scissors control others' Internet access? If I am hacked and my network scissors are disconnected, is there any more rational solution besides being in the middle? So I need to learn about ARP spoofing, ARP spoofing-wiki, ARP spoofing-Baidu encyclopedia
5. recently, I am idle. I am working part-time in the network center. I have a job opportunity to get the network access traffic at the school's entrances and exits. I want to see if everyone is online, what
How do I disable the computer system's security alerts ?, Turn off computer alarms
How to turn off the computer system security alarm, always pop up
First, right-click the Blue Box property and check the hidden inactive icon.
Then, start-Control Panel
Find t
In recent years, along with the development of computer networks and communication technology, it not only brings great convenience to people's lives, but also enables people to enjoy more material and culture. At the same time, network security threats are becoming more and more serious, such as hacker attacks, data theft, and virus release. Although we are also using complex software technologies such as
With the rapid popularization of information technology, people gradually become dependent on networks. However, due to the vulnerability and complexity of network systems, network security threats will affect people's lives. Therefore, it is imperative to prevent and solve network security problems. Computer network security
The current situation of computer network security and the Countermeasures take the main factors affecting the computer network security as a breakthrough, and focus on the Analysis and Prevention of various measures that are not conducive to the normal operation of computer
1, what is the account treasure?
A: The account treasure is a special protection QQ security, by Tencent QQ and Tencent Computer Butler jointly launched QQ security protection function, aims to enhance the user QQ account protection. The Tencent QQ Joint computer steward launched account Treasure, for QQ users to prov
Abstract: With the development of computer networks, it brings resources sharing to people. At the same time, there are great security risks in data security. The TCP/IP protocol is widely used for communication in today's networks. This article analyzes computer network security
level. Half of the passwords with less than 8 characters are considered to be easily cracked. You can use 10 or 12 characters as the password. It is better to use 16 characters. If it is not too long and difficult to type, it is safer to keep your password as long as possible.
2. Complete boundary protection
Not all security issues occur on the system desktop. Using an External Firewall/router to help protect your
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.