The mobile cellular network has its origins in Telco voice networks, but 5G adopts the principles of modern clouds. This......more
...more
...more
Trying to develop your own multiplayer online game can be overwhelming, especially as information on multiplayer specifi......more
...more
Cloud Computing Architected describes the essential components of a cloud-based application and presents the architectur......more
In this fully updated book, options trading innovator George Fontanills arms you with the knowledge and skills youneed t......more
It used to be that two laptops, sitting side by side, couldn’t communicate with each other; they may as well have been a......more
Cisco routers are everywhere that networks are. They come in all sizes, from inexpensive units for homes and small offic......more
More and more businesses today have their receive phone service through Internet instead of local phone company lines. M......more
Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you’re under incr......more
Be more productive and make your life easier. That’s what LDAP System Administration is all about. System administrators......more
Most applications these days are at least somewhat network aware, but how do you protect those applications against comm......more
Written by one of the highest rated speakers at Visual Basic conferences, "Doing Web Development" focuses on the proper ......more
...more
A comprehensive and practical framework for ethical practices in contemporary cybersecurity While some professions - inc......more
Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. You......more
- 268 CCNA Interview Questions - 76 HR Interview Questions - Real life scenario based questions - Strategies to respond ......more
What can your organization gain by adopting HTTP/2? How about faster, simpler, and more robust websites and applications......more
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your c......more
Imagine a set of simple principles that could help you to understand how parts combine to become a whole, and how each p......more
...more
As telecommunications operators and network engineers understand, specific operational requirements drive early network ......more
The CompTIA Security+ Get Certified Get Ahead SY0-401 Study Guide is an update to the top-selling SY0-201 and SY0-301 st......more
Publisher’s Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authentic......more
With Windows 8, Microsoft completely reimagined the graphical user interface for its operating system, and designed it t......more
Your easy-to-follow step-by-step guide to configuring a Cisco router from the ground up! The Accidental Administratortm:......more
If you work with SharePoint, you may have discovered that there are countless tricks for using this platform to solve re......more
Publisher’s Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authentic......more
The core concepts and technologies of Windows networking Networking can be a complex topic, especially for those new to ......more
Get ready to create distributed sensor systems and intelligent interactive devices using the ZigBee wireless networking ......more
This book offers an introduction to Flash Catalyst for designers with intermediate to advanced skills. It discusses wher......more
Once you know how to use Flash, you can create everything from simple animations to high-end desktop applications, but i......more
While the REST design philosophy has captured the imagination of web and enterprise developers alike, using this approac......more
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud co......more
Silverlight is Microsoft’s breakthrough technology for creating rich experiences on the web. This book illustrates the p......more
This practical book provides everything you need to know about the Extensible Messaging and Presence Protocol (XMPP). Th......more
RESTful .NET is the first book that teaches Windows developers to build RESTful web services using the latest Microsoft ......more
Want to build Facebook applications that truly stand out among the thousands already available? In addition to providing......more
Among the tests you perform on web applications, security testing is perhaps the most important, yet it’s often the most......more
"A good book! It’s a nice overview of wiki editing and administration, with pointers to handy extensions and further onl......more
It takes a book as versatile as its subject to cover Apache Tomcat, the popular open source Servlet and JSP container an......more
If you’re considering the vastly improved 2007 version of SharePoint, this concise, practical and friendly guide will te......more
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book a......more
If you are a network administrator, you’re under a lot of pressure to ensure that mission-critical systems are completel......more
...more
First, there was HTML. Then along came JavaScript. Close on the heels of JavaScript came CSS and before you mastered tha......more
The DNS & BIND Cookbook presents solutions to the many problems faced by network administrators responsible for a name s......more
Many serious Java programmers, especially enterprise Java programmers, consider the new I/O API--called NIO for New Inpu......more
ASP in a Nutshell provides the high-quality reference documentation that web application developers really need to creat......more
How are state adversaries using disinformation on social media to advance their interests? What does the joint force?and......more
A step-by-step guide to master version control with Git Key Features ● Learn how to handle code changes using the Git co......more
In less than a decade, the Internet went from being a series of loosely connected networks used by universities and the ......more
Millions of people around the world today spend portions of their lives in online virtual worlds. Second Life is one of ......more
On 12 October 2022, the EDPB (European Data Protection Board) endorsed the Europrivacy(TM)/(R) certification scheme. Thi......more
The PCI DSS (Payment Card Industry Data Security Standard) is now on its fourth version. The withdrawal date for v3.2.1 ......more
The real world of espionage and counterespionage was not what I expected. An ordinary guy like me, a roofer with a Maste......more
This book explains the five pillars or battlefields of cybersecurity and how a Zero Trust approach can change the advant......more
Translating traditional coaching methods and competencies for use in the online world, this informative and timely guide......more
Ransomware will cost companies around the world $20 billion in 2021. Prepare for, recognise and survive ransomware attac......more
How is human embodiment transformed in an age of algorithms? How do post-cinematic media technologies such as AI, VR, an......more
...more
Online technologies excite the public imagination with narratives of democratization. The Internet is a political medium......more
In The Souls of Cyberfolk, Thomas Foster traces the transformation of cyberpunk from a literary movement into a multimed......more
A double is haunting the world--the double of abstraction, the virtual reality of information, programming or poetry, ma......more
...more
The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even ......more
This book covers what Visual Basic developers need to know in order to combine Visual Basic with Microsoft Internet Info......more
Publisher’s Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authentic......more
Microsoft SharePoint products and technologies have become increasingly popular as a collaboration solution for organiza......more
This is the most up-to-date book on XML available, covering current web standards and server-side language versions. It ......more
This practical reference guide offers hundreds of useful tasks for managing Windows 2000 and Windows Server 2003, Micros......more
ASP.NET 1.1 Solutions Toolkit is a collection of reusable ASP.NET components, all of which serve two purposes. First, th......more
What is this book about? Beginning PHP5 is a complete tutorial in PHP5 s language features and functionality, beginning ......more
* The only book available on programming the new breed of interactive cell phones. * Emphasis on both technical material......more
Building Wireless Community Networks is about getting people online using wireless network technology. The 802.11b stand......more
Dies ist der erste Investmentleitfaden für Netzwerkdienste! Ein Bewertungsleitfaden für Serviceauswahl, -Management und ......more
Jython is an implementation of the Python programming language written in 100% pure Java, so it runs under any compliant......more
A comprehensive reference tool in humanities computing. Essays in nine disciplines describe resources and introduce the ......more
Microsoft Exchange is a big, complicated application; it requires more disk storage than Windows NT Server and has sever......more
In the last decade, the Internet has grown from a network that connected a few universities and research centers to a ne......more
For many small businesses, organisations, clubs, artists, faith groups, voluntary organisations/charities and sole trade......more
In this much-anticipated book from acclaimed blogger Vicki Davis (Cool Cat Teacher), you ll learn the key shifts in wri......more
...more
Anyone can type a few keywords into a search engine. But that’s only the beginning. With Studying Using the Web you can ......more
...more
...more
...more
...more