Ask our staff anything about our shop or products, or leave your feedback.
The first major book on MDM written by Group Policy and Enterprise Mobility MVP and renowned expert, Jeremy Moskowitz!
With Windows 10, organizations can create ...
As protecting information becomes a rapidly growing concern for today's businesses, certifications in IT security have become highly desirable, even as the number of ...
All you need to know about SharePoint Online and SharePoint Server
SharePoint is an enterprise portal server living under the Microsoft Office umbrella. It can ...
A practical handbook to cybersecurity for both tech and non-tech professionals
As reports of major data breaches fill the headlines, it has become impossible for ...
Your one-stop reference for Windows Server 2019 and PowerShell know-how
Windows Server 2019 & PowerShell All-in-One For Dummies offers a single reference to help you ...
My Online Privacy for Seniors is an exceptionally easy and complete guide to protecting your privacy while you take advantage of the extraordinary resources available ...
Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine's boot process or UEFI firmware ...
Hackers know everything about us. We know almost nothing about them. Until now.
Hackers know everything about us. We know almost nothing about them. Until ...
An easy-to-read guide to protecting your digital life and your family online
The rise of new technologies in our lives, which has taken us from ...
The most extensive account yet of the lives of cybercriminals and the vast international industry they have created, deeply sourced and based on field research ...
The perfect introduction to pen testing for all IT professionals and students
Welcome to today's most useful and practical introduction to penetration testing. Chuck ...
This book is a complete guide to establishing a cybersecurity program and governance in your organisation. In this book, you will learn how to create ...
Uses real-world bug reports (vulnerabilities in software or in this case web applications) to teach programmers and InfoSec professionals how to discover and protect vulnerabilities ...
Enterprise and service provider networks are increasingly adopting SIP as the guiding protocol for session management, and require leveraging Session Border Controller (SBC) technology to ...
Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization.
Malware Data Science explains how to identify ...