排序依

共有10385

Private 5G: A Systems Approach

Private 5G: A Systems Approach

The mobile cellular network has its origins in Telco voice networks, but 5G adopts the principles of modern clouds. This......more

Development and Deployment of Multiplayer Online Games, Vol. I: GDD, Authoritative Servers, Communications

Development and Deployment of Multiplayer Online Games, Vol. I: GDD, Authoritative Servers, Communications

Trying to develop your own multiplayer online game can be overwhelming, especially as information on multiplayer specifi......more

Cloud Computing Architected: Solution Design Handbook

Cloud Computing Architected: Solution Design Handbook

Cloud Computing Architected describes the essential components of a cloud-based application and presents the architectur......more

Trade Options Online

Trade Options Online

In this fully updated book, options trading innovator George Fontanills arms you with the knowledge and skills youneed t......more

Zero Configuration Networking: the Definitive Guide: The Definitive Guide

Zero Configuration Networking: the Definitive Guide: The Definitive Guide

It used to be that two laptops, sitting side by side, couldn’t communicate with each other; they may as well have been a......more

Cisco IOS In A Nutshell

Cisco IOS In A Nutshell

Cisco routers are everywhere that networks are. They come in all sizes, from inexpensive units for homes and small offic......more

Switching to VoIP

Switching to VoIP

More and more businesses today have their receive phone service through Internet instead of local phone company lines. M......more

Managing Security With Snort and IDS Tools

Managing Security With Snort and IDS Tools

Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you’re under incr......more

Ldap System Administration

Ldap System Administration

Be more productive and make your life easier. That’s what LDAP System Administration is all about. System administrators......more

Network Security With Openssl

Network Security With Openssl

Most applications these days are at least somewhat network aware, but how do you protect those applications against comm......more

Doing Web Development: Client-Side Techniques

Doing Web Development: Client-Side Techniques

Written by one of the highest rated speakers at Visual Basic conferences, "Doing Web Development" focuses on the proper ......more

The Code of Honor: Embracing Ethics in Cybersecurity

The Code of Honor: Embracing Ethics in Cybersecurity

A comprehensive and practical framework for ethical practices in contemporary cybersecurity While some professions - inc......more

Firewalls Don’t Stop Dragons: A Step-By-Step Guide to Computer Security and Privacy for Non-Techies

Firewalls Don’t Stop Dragons: A Step-By-Step Guide to Computer Security and Privacy for Non-Techies

Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. You......more

CCNA Interview Questions You’’ll Most Likely Be Asked

CCNA Interview Questions You’’ll Most Likely Be Asked

  • Ingram,出版日期:2018-04-11

- 268 CCNA Interview Questions - 76 HR Interview Questions - Real life scenario based questions - Strategies to respond ......more

Learning HTTP/2: A Practical Guide for Beginners

Learning HTTP/2: A Practical Guide for Beginners

What can your organization gain by adopting HTTP/2? How about faster, simpler, and more robust websites and applications......more

Ransomware: Defending Against Digital Extortion

Ransomware: Defending Against Digital Extortion

The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your c......more

Thinking in Promises

Thinking in Promises

Imagine a set of simple principles that could help you to understand how parts combine to become a whole, and how each p......more

Comptia Security+: Get Certified Get Ahead

Comptia Security+: Get Certified Get Ahead

The CompTIA Security+ Get Certified Get Ahead SY0-401 Study Guide is an update to the top-selling SY0-201 and SY0-301 st......more

Cryptography: InfoSec Pro Guide

Cryptography: InfoSec Pro Guide

Publisher’s Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authentic......more

Windows 8: The Missing Manual

Windows 8: The Missing Manual

With Windows 8, Microsoft completely reimagined the graphical user interface for its operating system, and designed it t......more

The Accidental Administrator: Cisco Router Step-by-Step Configuration Guide

The Accidental Administrator: Cisco Router Step-by-Step Configuration Guide

Your easy-to-follow step-by-step guide to configuring a Cisco router from the ground up! The Accidental Administratortm:......more

Sharepoint 2010 at Work

Sharepoint 2010 at Work

If you work with SharePoint, you may have discovered that there are countless tricks for using this platform to solve re......more

Securing the Clicks: Network Security in the Age of Social Media

Securing the Clicks: Network Security in the Age of Social Media

Publisher’s Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authentic......more

Microsoft Windows Networking Essentials

Microsoft Windows Networking Essentials

The core concepts and technologies of Windows networking Networking can be a complex topic, especially for those new to ......more

Building Wireless Sensor Networks

Building Wireless Sensor Networks

Get ready to create distributed sensor systems and intelligent interactive devices using the ZigBee wireless networking ......more

Foundation Flash Catalyst

Foundation Flash Catalyst

This book offers an introduction to Flash Catalyst for designers with intermediate to advanced skills. It discusses wher......more

Flash CS5: The Missing Manual

Flash CS5: The Missing Manual

Once you know how to use Flash, you can create everything from simple animations to high-end desktop applications, but i......more

RESTful Web Services Cookbook

RESTful Web Services Cookbook

While the REST design philosophy has captured the imagination of web and enterprise developers alike, using this approac......more

Hacking: The Next Generation

Hacking: The Next Generation

With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud co......more

Foundation Silverlight 3 Animation

Foundation Silverlight 3 Animation

Silverlight is Microsoft’s breakthrough technology for creating rich experiences on the web. This book illustrates the p......more

XMPP: The Definitive Guide: Building Real-Time Applications with Jabber Technologies

XMPP: The Definitive Guide: Building Real-Time Applications with Jabber Technologies

This practical book provides everything you need to know about the Extensible Messaging and Presence Protocol (XMPP). Th......more

Restful.net

Restful.net

RESTful .NET is the first book that teaches Windows developers to build RESTful web services using the latest Microsoft ......more

Facebook Cookbook

Facebook Cookbook

Want to build Facebook applications that truly stand out among the thousands already available? In addition to providing......more

Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast

Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast

Among the tests you perform on web applications, security testing is perhaps the most important, yet it’s often the most......more

MediaWiki

MediaWiki

"A good book! It’s a nice overview of wiki editing and administration, with pointers to handy extensions and further onl......more

Tomcat: The Definitive Guide

Tomcat: The Definitive Guide

It takes a book as versatile as its subject to cover Apache Tomcat, the popular open source Servlet and JSP container an......more

Essential Sharepoint 2007

Essential Sharepoint 2007

If you’re considering the vastly improved 2007 version of SharePoint, this concise, practical and friendly guide will te......more

Network Security Hacks

Network Security Hacks

In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book a......more

Snort Cookbook

Snort Cookbook

If you are a network administrator, you’re under a lot of pressure to ensure that mission-critical systems are completel......more

Webmaster in a Nutshell

Webmaster in a Nutshell

First, there was HTML. Then along came JavaScript. Close on the heels of JavaScript came CSS and before you mastered tha......more

Dns and Bind Cookbook

Dns and Bind Cookbook

The DNS & BIND Cookbook presents solutions to the many problems faced by network administrators responsible for a name s......more

Java Nio

Java Nio

Many serious Java programmers, especially enterprise Java programmers, consider the new I/O API--called NIO for New Inpu......more

Asp in a Nutshell: A Desktop Quick Reference

Asp in a Nutshell: A Desktop Quick Reference

ASP in a Nutshell provides the high-quality reference documentation that web application developers really need to creat......more

Combating Foreign Disinformation on Social Media: Study Overview and Conclusions

Combating Foreign Disinformation on Social Media: Study Overview and Conclusions

How are state adversaries using disinformation on social media to advance their interests? What does the joint force?and......more

Git Repository Management in 30 Days: Learn to manage code repositories like a pro (English Edition)

Git Repository Management in 30 Days: Learn to manage code repositories like a pro (English Edition)

A step-by-step guide to master version control with Git Key Features ● Learn how to handle code changes using the Git co......more

How the Internet Became Commercial: Innovation, Privatization, and the Birth of a New Network

How the Internet Became Commercial: Innovation, Privatization, and the Birth of a New Network

In less than a decade, the Internet went from being a series of loosely connected networks used by universities and the ......more

Coming of Age in Second Life: An Anthropologist Explores the Virtually Human

Coming of Age in Second Life: An Anthropologist Explores the Virtually Human

Millions of people around the world today spend portions of their lives in online virtual worlds. Second Life is one of ......more

Europrivacy(TM)/(R): The first European Data Protection Seal

Europrivacy(TM)/(R): The first European Data Protection Seal

On 12 October 2022, the EDPB (European Data Protection Board) endorsed the Europrivacy(TM)/(R) certification scheme. Thi......more

PCI DSS Version 4.0: A guide to the payment card industry data security standard

PCI DSS Version 4.0: A guide to the payment card industry data security standard

The PCI DSS (Payment Card Industry Data Security Standard) is now on its fourth version. The withdrawal date for v3.2.1 ......more

I Spy: How Not to Collude With A Russian

I Spy: How Not to Collude With A Russian

The real world of espionage and counterespionage was not what I expected. An ordinary guy like me, a roofer with a Maste......more

Losing the Cybersecurity War: And What We Can Do to Stop It

Losing the Cybersecurity War: And What We Can Do to Stop It

This book explains the five pillars or battlefields of cybersecurity and how a Zero Trust approach can change the advant......more

Online Coaching: A Practical Guide

Online Coaching: A Practical Guide

Translating traditional coaching methods and competencies for use in the online world, this informative and timely guide......more

The Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks

The Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks

Ransomware will cost companies around the world $20 billion in 2021. Prepare for, recognise and survive ransomware attac......more

Post-Cinematic Bodies

Post-Cinematic Bodies

How is human embodiment transformed in an age of algorithms? How do post-cinematic media technologies such as AI, VR, an......more

Private Sphere: Democracy in a Digital Age

Private Sphere: Democracy in a Digital Age

Online technologies excite the public imagination with narratives of democratization. The Internet is a political medium......more

The Souls Of Cyberfolk: Posthumanism As Vernacular Theory

The Souls Of Cyberfolk: Posthumanism As Vernacular Theory

In The Souls of Cyberfolk, Thomas Foster traces the transformation of cyberpunk from a literary movement into a multimed......more

A Hacker Manifesto

A Hacker Manifesto

A double is haunting the world--the double of abstraction, the virtual reality of information, programming or poetry, ma......more

Radius

Radius

The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even ......more

Internet Programming With Visual Basic

Internet Programming With Visual Basic

This book covers what Visual Basic developers need to know in order to combine Visual Basic with Microsoft Internet Info......more

Microsoftr Office SharePointr Server 2007: A Beginner’s Guide

Microsoftr Office SharePointr Server 2007: A Beginner’s Guide

Publisher’s Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authentic......more

Pro Sharepoint Solution Development: Combining .net, Sharepoint and Office 2007

Pro Sharepoint Solution Development: Combining .net, Sharepoint and Office 2007

Microsoft SharePoint products and technologies have become increasingly popular as a collaboration solution for organiza......more

Beginning Xml With Dom And Ajax: From Novice To Professional

Beginning Xml With Dom And Ajax: From Novice To Professional

This is the most up-to-date book on XML available, covering current web standards and server-side language versions. It ......more

Windows Server Cookbook

Windows Server Cookbook

This practical reference guide offers hundreds of useful tasks for managing Windows 2000 and Windows Server 2003, Micros......more

Asp.net 1.1 Solutions Toolkit

Asp.net 1.1 Solutions Toolkit

ASP.NET 1.1 Solutions Toolkit is a collection of reusable ASP.NET components, all of which serve two purposes. First, th......more

Beginning Php5

Beginning Php5

What is this book about? Beginning PHP5 is a complete tutorial in PHP5 s language features and functionality, beginning ......more

Software Development for the Qualcomm Brew Platform Rischpater

Software Development for the Qualcomm Brew Platform Rischpater

* The only book available on programming the new breed of interactive cell phones. * Emphasis on both technical material......more

Building Wireless Community Networks

Building Wireless Community Networks

Building Wireless Community Networks is about getting people online using wireless network technology. The 802.11b stand......more

Network Services Investment Guide: Maximizing Roi in Uncertain Times

Network Services Investment Guide: Maximizing Roi in Uncertain Times

Dies ist der erste Investmentleitfaden für Netzwerkdienste! Ein Bewertungsleitfaden für Serviceauswahl, -Management und ......more

Jython Essentials

Jython Essentials

Jython is an implementation of the Python programming language written in 100% pure Java, so it runs under any compliant......more

Managing Microsoft Exchange Server

Managing Microsoft Exchange Server

Microsoft Exchange is a big, complicated application; it requires more disk storage than Windows NT Server and has sever......more

Using and Managing Ppp

Using and Managing Ppp

In the last decade, the Internet has grown from a network that connected a few universities and research centers to a ne......more

Gdpr: A Game of Snakes and Ladders: How Small Businesses Can Win at the Compliance Game

Gdpr: A Game of Snakes and Ladders: How Small Businesses Can Win at the Compliance Game

For many small businesses, organisations, clubs, artists, faith groups, voluntary organisations/charities and sole trade......more

Reinventing Writing: The 9 Tools That Are Changing Writing, Teaching, and Learning Forever

Reinventing Writing: The 9 Tools That Are Changing Writing, Teaching, and Learning Forever

In this much-anticipated book from acclaimed blogger Vicki Davis (Cool Cat Teacher), you ll learn the key shifts in wri......more

Studying Using the Web: The Student’s Guide to Using the Ultimate Information Resource

Studying Using the Web: The Student’s Guide to Using the Ultimate Information Resource

Anyone can type a few keywords into a search engine. But that’s only the beginning. With Studying Using the Web you can ......more

104上一頁 11 12 13 14 15 16 17 18 19 20 下一頁 跳到

外文書書籍分類