Ask our staff anything about our shop or products, or leave your feedback.
The purpose of this book is to walk a person with basic IT experience through the process of creating a virtual corporate infrastructure using the ...
Using System Center 2012 Orchestrator, you can capture and document processes across your entire IT organization, establishing the automation you need to deliver advanced cloud ...
The smart way to learn Microsoft SharePoint 2013-one step at a time!
Experience learning made easy-and quickly teach yourself how to boost team collaboration with ...
We need to re-think our security paradigm from the long-standing one of trying to keep bad guys out of our networks to assuming that they ...
The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the ...
This is the definitive guide to building cost-effective, enterprise-strength monitoring infrastructures with the latest commercial and open source versions of Nagios. World-renowned monitoring expert David ...
SharePoint 2013 How-To
Need fast, reliable, easy-to-implement solutions for SharePoint 2013? This book delivers exactly what you're looking for:
step-by-step help and guidance with ...
This portable reference to Windows PowerShell summarizes both the command shell and scripting language, and provides a concise reference to the major tasks that make ...
If you're ready to build a large network system, this handy excerpt from Ethernet: The Definitive Guide, Second Edition gets you up to speed ...
The book describes data-driven approach to optimal monitoring and alerting in distributed computer systems. It interprets monitoring as a continuous process aimed at extraction of ...
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included ...
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers ...
This is the first comprehensive Operations Manager 2012 technical resource for every IT implementer and administrator. Building on their bestselling OpsMgr 2007 book, three Microsoft ...
For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees ...