Please turn on your JavaScript for this page to function normally.
Designing and Implementing a Server Infrastructure

Prepare for Exam 70-413 and help demonstrate your real-world mastery of enterprise server design and implementation. Designed for experienced, MCSA-certified professionals …

Mac Kung Fu, 2nd Edition: Tips, Tricks, Hints, and Hacks

Get over 400 quick and easy tips, tricks, hints and hacks in Mac Kung Fu, Second Edition. Exploit secret settings and hidden apps, push built-in tools to the limit, radically …

Training Guide: Installing and Configuring Windows Server 2012

Designed to help enterprise administrators develop real-world, job-role-specific skills, this Training Guide focuses on deploying and managing core infrastructure services in …

Hacking Web Apps

Web security impacts applications, servers and browsers. Successful attacks against Web applications and sites means bad news for their owners, developers and users. This book …

Nmap 6: Network exploration and security auditing cookbook

Nmap 6: Network exploration and security auditing cookbook will help you master Nmap and its scripting engine. You will learn how to use this tool to do a wide variety of …

Windows 8 Hacks

Windows 8 is quite different than previous Microsoft operating systems, but it’s still eminently hackable. With Windows 8 Hacks, you’ll learn how to make a variety …

CompTIA A+ Complete Lab Manual

Designed to complement CompTIA A+ Complete Study Guide, this hands-on companion book takes you step by step through the tasks a PC technician is likely to face on any given …

Virtualization Security: Protecting Virtualized Environments

Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and …

Windows Server 2012: Up and Running

If your organization plans to move to a cloud infrastructure from a LAN or WAN, this book shows you how to do it efficiently with Windows Server 2012. Experienced Windows …

Free ebook identifies easy to manage network security vulnerabilities

nCircle announced the release of a new eBook entitled “Just Turn it Off” (PDF, ePub). The book identifies twelve network security vulnerabilities that are both …

Free ebook: Introducing Windows 8

Get a headstart evaluating Window 8—guided by a Windows expert who’s worked extensively with the software since the preview releases. Based on final, …

Mac OS X and iOS Internals

Powering Macs, iPhones, iPads and more, OS X and iOS are becoming ubiquitous. When it comes to documentation, however, much of them are shrouded in mystery. Cocoa and Carbon, …

Don't miss

Cybersecurity news