Ask our staff anything about our shop or products, or leave your feedback.
Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to match marketability and ...
Microservice-based applications enable unprecedented agility and ease of management, and Docker containers are ideal for building them. Microsoft Azure offers all the foundational technology and ...
Technologies and Control Technologies and Control
This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry ...
Microsoft Azure Service Fabric makes it easier than ever before to build large-scale distributed cloud applications. You can quickly develop and update microservice-based applications, efficiently ...
VCP6-DCV Official Cert Guide presents you with an organised test-preparation routine through the use of proven series elements and techniques. "Do I Know This Already ...
The #1 bestselling beginner's guide to computer networking?now in a new edition
Need networking know-how, but don't know where to turn? Run ...
The authors begin with a high-level overview of the Internet of Things (IoT) and introduce key concepts needed to successfully design IoT solutions. Next, they ...
Master CEH v9 and identify your weak spots
CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five ...
The ultimate preparation guide for the unique CEH exam.
The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH ...
n n
Are you ready to build a network, but aren't sure where to start? Networking All-In-One For Dummies, 6th Edition walks you through the basics ...
Your no-nonsense guide to Near Field Communication
Are you a newcomer to Near Field Communication and baffled by the scant documentation and online support available ...
Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad guys? Certainly not! Hacking ...
How can you make multivendor services work smoothly on today's complex networks? This practical book shows you how to deploy a large portfolio of ...