Seven Databases in Seven Weeks
For years, the popularity of relational databases created by Oracle, Microsoft, and IBM, and of the open source MySQL, PostgreSQL, and SQLite was undisputed. But, in time, …
Hadoop: The Definitive Guide, 3rd Edition
Ready to unlock the power of your data? With this comprehensive guide, you’ll learn how to build and maintain reliable, scalable, distributed systems with Apache Hadoop. …
Introducing Windows Server 2012
Windows Server 2012, currently available as a Release Candidate, brings forward hundreds of new features and enhancements including cloud computing, networking, storage, …
Hacking Exposed 7: Network Security Secrets and Solutions
Hacking Exposed 7: Network Security Secrets and Solutions is filled with all-new information on today’s most devastating attacks and proven countermeasures. The 7th …
Reverse Deception: Organized Cyber Threat Counter-Exploitation
Reverse Deception: Organized Cyber Threat Counter-Exploitation explains how to identify APTs, categorize them according to risk level, and prioritize your actions accordingly …
CompTIA Security+ Rapid Review
Assess your readiness for CompTIA Security+ Exam SY0-301 and identify where you need to focus and practice. This practical guide walks you through each exam objective, …
Think Like a Programmer
The real challenge of programming isn’t learning a language’s syntax—it’s learning to creatively solve problems so you can build something great. In this …
Understanding IPv6, 3rd Edition
Get in-depth technical information to put IPv6 technology to work—including networks with hardware running Windows 8 and Windows Server 2012. Written by a networking expert, …
Mastering Windows Network Forensics and Investigation
Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book …
Microsoft SQL Server 2012 T-SQL Fundamentals
Get started with the fundamentals of Transact-SQL and learn how to write efficient and powerful database queries. With this hands-on guide, you’ll gain a solid …
Hack This: 24 Incredible Hackerspace Projects from the DIY Movement
Hack This is your passport to the world of hackerspaces: your invitation to share knowledge, master tools, work together and build amazing stuff. Twin Cities Maker co-founder …
Network Forensics: Tracking Hackers Through Cyberspace
Learn to recognize hackers’ tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace. Carve suspicious email attachments from …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility