Malware Forensics Field Guide for Windows Systems
If you are looking for a field guide that will help you identify malware on a Windows computer system, examine it, and determine its impact, than this book might be just the …
The Death of the Internet
Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, …
Information Systems for Managers: Text & Cases, 2nd Edition
Information Systems for Managers is a text for MBA and other managerially-oriented courses on Information Systems. As with the first edition, the main focus of the book is on …
Administering Microsoft SQL Server 2012 Databases
Ace your preparation for the skills measured by Exam 70-462—and on the job—with this official Microsoft study guide. Work at your own pace through a series of lessons and …
Ethics of Big Data
What are your organization’s policies for generating and using huge datasets full of personal information? Ethics of Big Data examines ethical questions raised by the …
Learning Unix for OS X Mountain Lion
Beneath OS X easy-to-use GUI interface lies a powerful Unix engine. Mac users have Unix, as well as a host of tools ported over from Linux, at their fingertips; the just need …
Windows Server 2012 Pocket Consultant
Portable and precise, this pocket-sized guide delivers ready answers for the day-to-day administration of Windows Server 2012. Zero in on core operations and daily tasks using …
Windows 8 Secrets
Microsoft is introducing a major new release of its Windows operating system, Windows 8, and what better way to learn all its ins and outs than from two internationally …
Microsoft Private Cloud Computing
Written by a team of expert authors who are MVPs and leaders in their respective fields, Microsoft Private Cloud Computing is an essential resource for IT administrators who …
Securing Cisco IP Telephony Networks
Cisco IP telephony leverages converged networks to dramatically reduce TCO and improve ROI. However, its critical importance to business communications and deep integration …
A Practical Guide to Fedora and Red Hat Enterprise Linux, 6th Edition
An increasing number of advanced users are drawn to open source solutions as an alternative to Microsoft Windows. The popular free Linux distribution Fedora and it's big …
Network Management: Principles and Practices, 2nd Edition
Network Management: Principles and Practices, 2nd Edition is thoroughly updated and expanded to address broadband network management and the latest trends in the network …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility