Ask our staff anything about our shop or products, or leave your feedback.
The Definitive, Up-to-Date Guide to Digital Forensics The rapid proliferation of cyber crime is increasing the demand for digital forensics experts in both law enforcement ...
As we all know by now, wireless networks offer many advantages over fixed (or wired) networks. Foremost on that list is mobility, since going wireless ...
If you're ready to build a large network system, this handy excerpt from Ethernet: The Definitive Guide, Second Edition gets you up to speed ...
Discover what Unified Communications can do for your business In our increasingly mobile world, communication must be effective, global, and available through multiple technologies seamlessly ...
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included ...
A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them! It's bad enough when a hack ...
If your job is to design or implement IT security solutions or if you're studying for any security certification, this is the how-to guide ...
Security Smarts for the Self-Guided IT Professional
Learn how to improve the security posture of your organization and defend against some of the most pervasive ...
"This book successfully addresses the approach for adopting cloud into organizations (small and large), realizing that every application may not be a fit for a ...
Your guide to planning and executing a complete mobile web strategy Revisit your approach to the mobile web-and deliver effective solutions that reach customers and ...
Security Smarts for the Self-Guided IT Professional. You can find out how to excel in the field of computer forensics investigations. You can learn what ...
The book describes data-driven approach to optimal monitoring and alerting in distributed computer systems. It interprets monitoring as a continuous process aimed at extraction of ...
Security Smarts for the Self-Guided IT Professional Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's ...
Get the focused, scenario-based guidance you need to plan and deploy Forefront Threat Management Gateway (TMG) as your network perimeter firewall. The evolution of Microsoft ...
Xen, the open source virtualization tool, is a system administrator's dream. Xen is a free, high-performance virtual machine monitor that lets you consolidate your ...