Please turn on your JavaScript for this page to function normally.
Mac OS X and iOS Internals

Powering Macs, iPhones, iPads and more, OS X and iOS are becoming ubiquitous. When it comes to documentation, however, much of them are shrouded in mystery. Cocoa and Carbon, …

Information Overload

Written and edited by an international group of experts from academia and industry, Information Overload clearly links academic theory to real-world practice, providing a …

Trojan Horse: A Novel

It’s two years after the Zero Day attacks, and cyber-security analyst Jeff Aiken is reaping the rewards for crippling Al-Qaida’s assault on the computer …

Effective MySQL: Replication Techniques in Depth

Effective MySQL: Replication Techniques in Depth describes what is needed to understand and implement MySQL replication to build scalable solutions. This book includes …

Windows 8 Bible

Windows 8 is a new version of Microsoft’s flagship operating system and it’s packed with exciting new features. From the new Windows lock screen and the new …

OS X Mountain Lion Pocket Guide

Since its release, OS X Mountain Lion has been hailed as the most advanced operating system coming out of Cupertino. With lots of new features and a myriad of small …

Windows 8 Administration Pocket Consultant

Portable and precise, this pocket-sized guide delivers ready answers for administering computers running Windows 8. Zero in on core operations and daily tasks using …

Everyday Cryptography: Fundamental Principles and Applications

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that …

Juniper MX Series

Discover why routers in the Juniper MX Series, with their advanced feature sets and record breaking scale, are so popular among enterprises and network service providers. This …

Malware Forensics Field Guide for Windows Systems

If you are looking for a field guide that will help you identify malware on a Windows computer system, examine it, and determine its impact, than this book might be just the …

The Death of the Internet

Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, …

Information Systems for Managers: Text & Cases, 2nd Edition

Information Systems for Managers is a text for MBA and other managerially-oriented courses on Information Systems. As with the first edition, the main focus of the book is on …

Don't miss

Cybersecurity news