Ask our staff anything about our shop or products, or leave your feedback.
"In this second edition of Extreme Programming Explained, Kent Beck organizes and presents five years' worth of experiences, growth, and change revolving around XP. If ...
If you've read a Head First book, you know what to expect a visually-rich format designed for the way your brain works. Using the ...
Cowritten by Ralph Kimball, the world's leading data warehousing authority, whose previous books have sold more than 150,000 copies
Delivers real-world solutions for ...
Widely considered one of the best practical guides to programming, Steve McConnell's original CODE COMPLETE has been helping developers write better software for more ...
The concept of user stories has its roots as one of the main tenets of Extreme
Programming. In simple terms, user stories represent an effective ...
The rules and practices for Scrum-a simple process for managing complex projects-are few, straightforward, and easy to learn. But Scrum's simplicity itself-its lack of ...
Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network
Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward ...
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado ...
Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any ...
Install, configure, and troubleshoot DNS with this straightforward guide!
This is a unique, entry-level guide to Domain Name System (DNS), which translates Internet host names ...
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included ...
The open source saga has many fascinating chapters. It is partly the story of Linus Torvalds, the master hacker who would become chief architect of ...
Appropriate for all graduate-level and upper-level courses in network or computer security.
Widely regarded as the most comprehensive yet comprehensible guide to network security, the ...
Schaum's Outline of Computer Architecture is intended for use as a problem-solved approach text in an undergraduate course called Computer Architecture, which is taken ...