Ask our staff anything about our shop or products, or leave your feedback.
Discover what Unified Communications can do for your business In our increasingly mobile world, communication must be effective, global, and available through multiple technologies seamlessly ...
With each new advance in connectivity and convenience comes a new wave of threats to privacy and security capable of destroying a company's reputation ...
This is the first comprehensive Operations Manager 2012 technical resource for every IT implementer and administrator. Building on their bestselling OpsMgr 2007 book, three Microsoft ...
This portable reference to Windows PowerShell summarizes both the command shell and scripting language, and provides a concise reference to the major tasks that make ...
Microsoft SharePoint Online for Office 365 is a concise reference to help students configure and manage Office 365 SharePoint. This book assumes knowledge of on-prem ...
Expert coverage of Microsoft's highly anticipated network software deployment tool The latest version of System Center Configuration Manager (SCCM) is a dramatic update of ...
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers ...
SharePoint 2013 How-To
Need fast, reliable, easy-to-implement solutions for SharePoint 2013? This book delivers exactly what you're looking for:
step-by-step help and guidance with ...
Welcome to today's most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of ...
The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the ...
How prepared are you to build fast and efficient web applications? This eloquent book provides what every web developer should know about the network, from ...
Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In this practical guide, security researcher Michael Collins shows ...
This practical book provides everything you need to know about the Extensible Messaging and Presence Protocol (XMPP). This open technology for real-time communication is used ...