A fast, hands-on introduction to offensive hacking techniques Hands-On Hacking teaches readers to see through the eyes o......more
Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediatel......more
See how the principles of Service Science govern the dynamics driving the adoption of cloud computing in the industry. C......more
...more
The Flash Platform is changing. Flash Builder and Flash Catalyst have brought a new separation of design and coding to w......more
Technical Support Essentials is a book about the many facets of technical support. It attempts to provide a wide array o......more
Discover Ext JS, one of today’s most powerful and highly regarded JavaScript frameworks, with perhaps the best set of GU......more
While Web 2.0 was about data, Web 3.0 is about knowledge and information. Scripting Intelligence: Web 3.0 Information Ga......more
Pro JavaScript RIA Techniques: Best Practices, Performance, and Presentation shows you how you can build JavaScript RIAs......more
There’s plenty of documentation on installing and configuring the Apache web server, but where do you find help for the ......more
This soup-to-nuts collection of recipes covers everything you need to know to perform your job as a Linux network admini......more
A much-needed work focusing on one of the e-community’s hottest topics, this is the second edition of a book that covers......more
This easy-to-use introduction to Microsoft Windows Communication Foundation (WCF) is ideal for developers who want to le......more
Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication an......more
The core idea behind Real World Web Services is simple: after years of hype, what are the major players really doing wit......more
For all the work and time invested in using LDAP, not enough time has been spent designing the layout and the logic of d......more
One of the most important elements in the computer revolution has been agreement on technological standards. The advance......more
Shows network administrators and IT pros how to harden their network infrastructure against hackers....more
If you want to become a Cybersecurity Professional, this book is for you! If you are studying for CompTIA Security+ or C......more
If you want to PASS the CompTIA Network+ Certification, this book is for you! BUY THIS BOOK NOW AND GET STARTED TODAY! I......more
If you want to PASS the MICROSOFT AZURE AZ-900 EXAM, this book is for you! BUY THIS BOOK NOW AND GET STARTED TODAY! I......more
...more
In the mid-2010s, a passionate community of Los Angeles-based storytellers, media artists, and tech innovators formed ar......more
...more
A wedding ceremony in a Web-based virtual world. Online memorials commemorating the dead. A coffee klatch attended by pe......more
The development of computer software for nonlinear control systems has provided many benefits for teaching, research, an......more
"Traditional secret-based credentials can’t scale to meet the complexity and size of cloud and on-premises infrastructur......more
The cloud promises cost savings, agility, and more. But the increasing complexity of modern IT systems often prevents bu......more
If you’re a cybersecurity professional, then you know how it often seems that no one cares about (or understands) inform......more
The 5G Myth explains why the vision of 5G, the next generation in mobile telephony, heralded as a huge advance in global......more
A comprehensive guide to Making It Happen Online. Whether you are just starting your own online business or taking your ......more
Successful wireless LAN implementations provide many benefits to enterprises that deploy them to reach mobile workers. T......more
This is the complete hands-on guide to mastering the art of Content Management Systems (CMS) and Web site development us......more
A hugely practical and up-to-date work, this book is for developers looking to combine the latest advances in Windows an......more
For any organization that wants to use Windows SharePoint Services to share and collaborate on Microsoft Office document......more
SharePoint is obviously a hot technology. But the last year in development technology has seen such major technology rel......more
Windows Server 2003 Networking Recipes is intended for the network managers and Server 2003 system administrators who ar......more
Shows how to improve Windows desktop and server security by configuring default security before installing off-the-shelf......more
Pro DNS and BIND guides readers through the often challenging array of features surrounding DNS with a special focus on ......more
Have you noticed that the majority of .NET books seem intent on hiding you from real-world code? You can buy a 1,500-pag......more
More often than not, the words "sendmail configuration" strike dread in the hearts of sendmail and system administrators......more
Novell ZENworks for Servers (ZENworks stands for Zero Effort Networking) is the cross-platform solution for server conte......more
This detailed guide overviews the enterprise system management facilities, which are available as part of the Framework ......more
Apply data fabric solutions to automate data integration, data sharing, and data protection across disparate data source......more
...more
A practical guide to the ethnographic study of online cultures, and beyond Ethnography and Virtual Worlds is the only bo......more
Virtual Reality (VR) technology has become more sophisticated and widespread. Consumers embrace it for gaming and entert......more
...more
...more
Knowing your threat actors together with your weaknesses and the technology will master your defenseKey FeaturesGain pra......more
Explore IoT Architecture, Design, and its ImplementationKey FeaturesComprehensive overview of frameworks, protocols, net......more
...more
The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on secur......more
For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, jou......more
The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web......more
Who s watching you online? These days, it s hard to be sure. But the recent Edward Snowden revelations of NSA data minin......more
The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical a......more
In a very short time, individuals and companies have harnessed cyberspace to create new industries, a vibrant social spa......more
Video Compression for Flash, Apple Devices and HTML5: Sorenson Media Edition, is a professional reference for producers ......more
Are the machines in your office living isolated lives? Do you have a few computers at home that you want to connect to e......more
Free porn. The phrase conjures images of search engine scams, computer viruses and spam emails. It also hints at an impo......more
Are you ready to become a master of online open-source due diligence with the guidance of a top industry expert? "This b......more
The Future of Open Data flows from a multi-year Social Sciences and Humanities Research Council (SSHRC) Partnership Gran......more
Digital media, including social media, has fundamentally changed how the human species communicates with, relates to, an......more
...more
...more
By 2020, the Internet of Things (IoT) will consist of millions of computational devices intimately connected to real-wor......more
As virtual reality approaches mainstream consumer use, a vibrant development ecosystem has emerged in the past few years......more
Technology s influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the soft......more
Get valuable tips and techniques for automating your cloud deployments with Azure PowerShell cmdlets, and learn how to p......more
Implementing the Zendesk customer service software as part of your company’s operations can be time-consuming, but with ......more
Written by Ganglia designers and maintainers, this book shows you how to collect and visualize metrics from clusters, gr......more
...more
By integrating the Web with traditional TV, Google TV offers developers an important new channel for content. But creati......more
If you’re preparing to roll out IPv6 on your network, this concise book provides the essentials you need to support this......more
Asterisk has a wealth of features to help you customize your PBX to fill very specific business needs. This short cookbo......more
Knowledge Management (KM) is an effort to increase useful knowledge in the organization. It is a natural outgrowth of la......more
In this book, we consider the problem of achieving the maximum throughput and utility in a class of networks with resour......more
Privacy preservation has become a major issue in many data analysis applications. When a data set is released to other p......more
...more
...more
This firstPress title is the first book Geo-Mashups developers will need to create Web 2.0 applications based on Google’......more
...more
DNS The world’s most successful distributed database-and the most naïve. The Domain Name System is one of the Internet’s......more
Whether we realize it or not, we think of our brains as computers. In neuroscience, the metaphor of the brain as a compu......more
The evolution of advanced information environments is rapidly creating a new category of possible cyberaggression, which......more