排序依

共有10385

Hands on Hacking

Hands on Hacking

A fast, hands-on introduction to offensive hacking techniques Hands-On Hacking teaches readers to see through the eyes o......more

Applied Incident Response

Applied Incident Response

Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediatel......more

Cloud as a Service: Understanding the Service Innovation Ecosystem

Cloud as a Service: Understanding the Service Innovation Ecosystem

See how the principles of Service Science govern the dynamics driving the adoption of cloud computing in the industry. C......more

Flash Builder and Flash Catalyst: The New Workflow

Flash Builder and Flash Catalyst: The New Workflow

The Flash Platform is changing. Flash Builder and Flash Catalyst have brought a new separation of design and coding to w......more

Technical Support Essentials: Advice You Can Use to Succeed in Technical Support

Technical Support Essentials: Advice You Can Use to Succeed in Technical Support

Technical Support Essentials is a book about the many facets of technical support. It attempts to provide a wide array o......more

Practical Ext JS Projects With Gears

Practical Ext JS Projects With Gears

Discover Ext JS, one of today’s most powerful and highly regarded JavaScript frameworks, with perhaps the best set of GU......more

Scripting Intelligence: Web 3.0 Information Gathering and Processing

Scripting Intelligence: Web 3.0 Information Gathering and Processing

While Web 2.0 was about data, Web 3.0 is about knowledge and information. Scripting Intelligence: Web 3.0 Information Ga......more

Pro JavaScript RIA Techniques: Best Practices, Performance and Presentation

Pro JavaScript RIA Techniques: Best Practices, Performance and Presentation

Pro JavaScript RIA Techniques: Best Practices, Performance, and Presentation shows you how you can build JavaScript RIAs......more

Apache Cookbook

Apache Cookbook

There’s plenty of documentation on installing and configuring the Apache web server, but where do you find help for the ......more

Linux Networking Cookbook

Linux Networking Cookbook

This soup-to-nuts collection of recipes covers everything you need to know to perform your job as a Linux network admini......more

Podcast Solutions: The Complete Guide to Audio and Video Podcasting

Podcast Solutions: The Complete Guide to Audio and Video Podcasting

A much-needed work focusing on one of the e-community’s hottest topics, this is the second edition of a book that covers......more

learning WCF: Master Windows Communication Foundation and Soa Fundamentals

learning WCF: Master Windows Communication Foundation and Soa Fundamentals

This easy-to-use introduction to Microsoft Windows Communication Foundation (WCF) is ideal for developers who want to le......more

Ssh, the Secure Shell: The Definitive Guide

Ssh, the Secure Shell: The Definitive Guide

Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication an......more

Real World Web Services

Real World Web Services

The core idea behind Real World Web Services is simple: after years of hype, what are the major players really doing wit......more

Deploying OpenLDAP

Deploying OpenLDAP

For all the work and time invested in using LDAP, not enough time has been spent designing the layout and the logic of d......more

Triumph of Ethernet: Technological Communities and the Battle for the LAN Standard

Triumph of Ethernet: Technological Communities and the Battle for the LAN Standard

One of the most important elements in the computer revolution has been agreement on technological standards. The advance......more

Hardening Network Infrastructure

Hardening Network Infrastructure

Shows network administrators and IT pros how to harden their network infrastructure against hackers....more

CISSP Exam Study Guide: NIST Framework, Digital Forensics & Cybersecurity Governance

CISSP Exam Study Guide: NIST Framework, Digital Forensics & Cybersecurity Governance

If you want to become a Cybersecurity Professional, this book is for you! If you are studying for CompTIA Security+ or C......more

Computer Networking: Enterprise Network Infrastructure, Network Security & Network Troubleshooting Fundamentals

Computer Networking: Enterprise Network Infrastructure, Network Security & Network Troubleshooting Fundamentals

If you want to PASS the CompTIA Network+ Certification, this book is for you! BUY THIS BOOK NOW AND GET STARTED TODAY! I......more

Azure Cloud Computing Az-900 Exam Study Guide: 4 In 1 Microsoft Azure Cloud Deployment, Security, Privacy & Pricing Concepts

Azure Cloud Computing Az-900 Exam Study Guide: 4 In 1 Microsoft Azure Cloud Deployment, Security, Privacy & Pricing Concepts

If you want to PASS the MICROSOFT AZURE AZ-900 EXAM, this book is for you! BUY THIS BOOK NOW AND GET STARTED TODAY! I......more

In the Land of the Unreal: Virtual and Other Realities in Los Angeles

In the Land of the Unreal: Virtual and Other Realities in Los Angeles

In the mid-2010s, a passionate community of Los Angeles-based storytellers, media artists, and tech innovators formed ar......more

Online a Lot of the Time: Ritual, Fetish, Sign

Online a Lot of the Time: Ritual, Fetish, Sign

A wedding ceremony in a Web-based virtual world. Online memorials commemorating the dead. A coffee klatch attended by pe......more

Nonlinear Control Systems Using Matlab(r)

Nonlinear Control Systems Using Matlab(r)

The development of computer software for nonlinear control systems has provided many benefits for teaching, research, an......more

Cultivating Cloud Outcomes

Cultivating Cloud Outcomes

  • Ingram,出版日期:2023-01-17

The cloud promises cost savings, agility, and more. But the increasing complexity of modern IT systems often prevents bu......more

A Manager’’s Guide to Information Security: The Last Domain

A Manager’’s Guide to Information Security: The Last Domain

If you’re a cybersecurity professional, then you know how it often seems that no one cares about (or understands) inform......more

The 5g Myth: When Vision Decoupled from Reality

The 5g Myth: When Vision Decoupled from Reality

The 5G Myth explains why the vision of 5G, the next generation in mobile telephony, heralded as a huge advance in global......more

Internet Business Dreams: How I Sold $15 Million Online Starting from My Garage

Internet Business Dreams: How I Sold $15 Million Online Starting from My Garage

A comprehensive guide to Making It Happen Online. Whether you are just starting your own online business or taking your ......more

Implementing Successful Wireless Lans: Important Considerations In Deploying A Wireless Solution

Implementing Successful Wireless Lans: Important Considerations In Deploying A Wireless Solution

Successful wireless LAN implementations provide many benefits to enterprises that deploy them to reach mobile workers. T......more

Real-World Asp.Net: Building a Content Management System

Real-World Asp.Net: Building a Content Management System

This is the complete hands-on guide to mastering the art of Content Management Systems (CMS) and Web site development us......more

Pro SharePoint 2007 Development Techniques

Pro SharePoint 2007 Development Techniques

A hugely practical and up-to-date work, this book is for developers looking to combine the latest advances in Windows an......more

Sharepoint 2007: The Definitive Guide

Sharepoint 2007: The Definitive Guide

For any organization that wants to use Windows SharePoint Services to share and collaborate on Microsoft Office document......more

Pro Sharepoint 2003 Development Techniques

Pro Sharepoint 2003 Development Techniques

SharePoint is obviously a hot technology. But the last year in development technology has seen such major technology rel......more

Windows Server 2003 Networking Recipes: A Problem-solution Approach

Windows Server 2003 Networking Recipes: A Problem-solution Approach

Windows Server 2003 Networking Recipes is intended for the network managers and Server 2003 system administrators who ar......more

Professional Windows Desktop And Server Hardening

Professional Windows Desktop And Server Hardening

Shows how to improve Windows desktop and server security by configuring default security before installing off-the-shelf......more

Pro Dns And Bind

Pro Dns And Bind

Pro DNS and BIND guides readers through the often challenging array of features surrounding DNS with a special focus on ......more

Ultimate VB .Net and ASP.NET Code Book

Ultimate VB .Net and ASP.NET Code Book

Have you noticed that the majority of .NET books seem intent on hiding you from real-world code? You can buy a 1,500-pag......more

Sendmail Cookbook

Sendmail Cookbook

More often than not, the words "sendmail configuration" strike dread in the hearts of sendmail and system administrators......more

Novell’s Zenworks for Servers 3 Administrator’s Handbook

Novell’s Zenworks for Servers 3 Administrator’s Handbook

Novell ZENworks for Servers (ZENworks stands for Zero Effort Networking) is the cross-platform solution for server conte......more

.Net System Management Services

.Net System Management Services

This detailed guide overviews the enterprise system management facilities, which are available as part of the Framework ......more

Principles of Data Fabric: Become a data-driven organization by implementing Data Fabric solutions efficiently

Principles of Data Fabric: Become a data-driven organization by implementing Data Fabric solutions efficiently

Apply data fabric solutions to automate data integration, data sharing, and data protection across disparate data source......more

Ethnography and Virtual Worlds: A Handbook of Method

Ethnography and Virtual Worlds: A Handbook of Method

A practical guide to the ethnographic study of online cultures, and beyond Ethnography and Virtual Worlds is the only bo......more

The Reality of Virtuality: Harness the Power of Virtual Reality to Connect with Consumers

The Reality of Virtuality: Harness the Power of Virtual Reality to Connect with Consumers

Virtual Reality (VR) technology has become more sophisticated and widespread. Consumers embrace it for gaming and entert......more

Internet of Things (IoT) A Quick Start Guide: A to Z of IoT Essentials

Internet of Things (IoT) A Quick Start Guide: A to Z of IoT Essentials

Explore IoT Architecture, Design, and its ImplementationKey FeaturesComprehensive overview of frameworks, protocols, net......more

Mobile Data Loss: Threats and Countermeasures

Mobile Data Loss: Threats and Countermeasures

The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on secur......more

Practical Anonymity: Hiding in Plain Sight Online

Practical Anonymity: Hiding in Plain Sight Online

For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, jou......more

The Basics of Web Hacking: Tools and Techniques to Attack the Web

The Basics of Web Hacking: Tools and Techniques to Attack the Web

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web......more

The Basics of Digital Privacy: Simple Tools to Protect Your Personal Information and Your Identity Online

The Basics of Digital Privacy: Simple Tools to Protect Your Personal Information and Your Identity Online

Who s watching you online? These days, it s hard to be sure. But the recent Edward Snowden revelations of NSA data minin......more

The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice

The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice

The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical a......more

Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World

Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World

In a very short time, individuals and companies have harnessed cyberspace to create new industries, a vibrant social spa......more

Video Compression for Flash, Apple Devices and HTML5: The Sorenson Media Edition

Video Compression for Flash, Apple Devices and HTML5: The Sorenson Media Edition

Video Compression for Flash, Apple Devices and HTML5: Sorenson Media Edition, is a professional reference for producers ......more

Network Know-How

Network Know-How

Are the machines in your office living isolated lives? Do you have a few computers at home that you want to connect to e......more

Virtually Obscene: The Case for an Uncensored Internet

Virtually Obscene: The Case for an Uncensored Internet

Free porn. The phrase conjures images of search engine scams, computer viruses and spam emails. It also hints at an impo......more

Osint: The Authoritative Guide to Due Diligence

Osint: The Authoritative Guide to Due Diligence

Are you ready to become a master of online open-source due diligence with the guidance of a top industry expert? "This b......more

The Future of Open Data

The Future of Open Data

  • Ingram,出版日期:2022-05-24

The Future of Open Data flows from a multi-year Social Sciences and Humanities Research Council (SSHRC) Partnership Gran......more

Handbook of Adolescent Digital Media Use and Mental Health

Handbook of Adolescent Digital Media Use and Mental Health

  • Ingram,出版日期:2022-07-14

Digital media, including social media, has fundamentally changed how the human species communicates with, relates to, an......more

The Internet of Risky Things: Trusting the Devices That Surround Us

The Internet of Risky Things: Trusting the Devices That Surround Us

By 2020, the Internet of Things (IoT) will consist of millions of computational devices intimately connected to real-wor......more

Learning Virtual Reality: Developing Immersive Experiences and Applications for Desktop, Web, and Mobile

Learning Virtual Reality: Developing Immersive Experiences and Applications for Desktop, Web, and Mobile

As virtual reality approaches mainstream consumer use, a vibrant development ecosystem has emerged in the past few years......more

The Architecture of Privacy

The Architecture of Privacy

Technology s influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the soft......more

Automating Microsoft Azure Infrastructure Services

Automating Microsoft Azure Infrastructure Services

Get valuable tips and techniques for automating your cloud deployments with Azure PowerShell cmdlets, and learn how to p......more

Practical Zendesk Administration

Practical Zendesk Administration

Implementing the Zendesk customer service software as part of your company’s operations can be time-consuming, but with ......more

Monitoring with Ganglia

Monitoring with Ganglia

Written by Ganglia designers and maintainers, this book shows you how to collect and visualize metrics from clusters, gr......more

Building Web Apps for Google TV

Building Web Apps for Google TV

By integrating the Web with traditional TV, Google TV offers developers an important new channel for content. But creati......more

DNS and BIND on IPv6

DNS and BIND on IPv6

If you’re preparing to roll out IPv6 on your network, this concise book provides the essentials you need to support this......more

Asterisk Cookbook

Asterisk Cookbook

Asterisk has a wealth of features to help you customize your PBX to fill very specific business needs. This short cookbo......more

Knowledge Management (KM) Processes in Organizations: Theoretical Foundations and Practice

Knowledge Management (KM) Processes in Organizations: Theoretical Foundations and Practice

Knowledge Management (KM) is an effort to increase useful knowledge in the organization. It is a natural outgrowth of la......more

Scheduling and Congestion Control for Wireless and Processing Networks

Scheduling and Congestion Control for Wireless and Processing Networks

In this book, we consider the problem of achieving the maximum throughput and utility in a class of networks with resour......more

Privacy-Preserving Data Publishing

Privacy-Preserving Data Publishing

Privacy preservation has become a major issue in many data analysis applications. When a data set is released to other p......more

Google Maps Mashups with Google Mapplets

Google Maps Mashups with Google Mapplets

This firstPress title is the first book Geo-Mashups developers will need to create Web 2.0 applications based on Google’......more

DNSSEC Mastery, 2nd Edition

DNSSEC Mastery, 2nd Edition

DNS The world’s most successful distributed database-and the most naïve. The Domain Name System is one of the Internet’s......more

An Internet in Your Head: A New Paradigm for How the Brain Works

An Internet in Your Head: A New Paradigm for How the Brain Works

  • Ingram,出版日期:2021-05-04

Whether we realize it or not, we think of our brains as computers. In neuroscience, the metaphor of the brain as a compu......more

104上一頁 11 12 13 14 15 16 17 18 19 20 下一頁 跳到

外文書書籍分類