Ask our staff anything about our shop or products, or leave your feedback.
A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them! It's bad enough when a hack ...
If your job is to design or implement IT security solutions or if you're studying for any security certification, this is the how-to guide ...
We need to re-think our security paradigm from the long-standing one of trying to keep bad guys out of our networks to assuming that they ...
Security Smarts for the Self-Guided IT Professional
Learn how to improve the security posture of your organization and defend against some of the most pervasive ...
"This book successfully addresses the approach for adopting cloud into organizations (small and large), realizing that every application may not be a fit for a ...
Your guide to planning and executing a complete mobile web strategy Revisit your approach to the mobile web-and deliver effective solutions that reach customers and ...
Security Smarts for the Self-Guided IT Professional. You can find out how to excel in the field of computer forensics investigations. You can learn what ...
An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for ...
The book describes data-driven approach to optimal monitoring and alerting in distributed computer systems. It interprets monitoring as a continuous process aimed at extraction of ...
Security Smarts for the Self-Guided IT Professional Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's ...
This is the definitive guide to building cost-effective, enterprise-strength monitoring infrastructures with the latest commercial and open source versions of Nagios. World-renowned monitoring expert David ...
Get the focused, scenario-based guidance you need to plan and deploy Forefront Threat Management Gateway (TMG) as your network perimeter firewall. The evolution of Microsoft ...
Xen, the open source virtualization tool, is a system administrator's dream. Xen is a free, high-performance virtual machine monitor that lets you consolidate your ...
CompTIA-Authorized courseware for the Cloud Essentials Exam (CLO-001) What better way to get up to speed on cloud computing than with this new book in ...
The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ...