Please turn on your JavaScript for this page to function normally.
Information Overload

Written and edited by an international group of experts from academia and industry, Information Overload clearly links academic theory to real-world practice, providing a …

Trojan Horse: A Novel

It’s two years after the Zero Day attacks, and cyber-security analyst Jeff Aiken is reaping the rewards for crippling Al-Qaida’s assault on the computer …

Effective MySQL: Replication Techniques in Depth

Effective MySQL: Replication Techniques in Depth describes what is needed to understand and implement MySQL replication to build scalable solutions. This book includes …

Windows 8 Bible

Windows 8 is a new version of Microsoft’s flagship operating system and it’s packed with exciting new features. From the new Windows lock screen and the new …

OS X Mountain Lion Pocket Guide

Since its release, OS X Mountain Lion has been hailed as the most advanced operating system coming out of Cupertino. With lots of new features and a myriad of small …

Windows 8 Administration Pocket Consultant

Portable and precise, this pocket-sized guide delivers ready answers for administering computers running Windows 8. Zero in on core operations and daily tasks using …

Everyday Cryptography: Fundamental Principles and Applications

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that …

Juniper MX Series

Discover why routers in the Juniper MX Series, with their advanced feature sets and record breaking scale, are so popular among enterprises and network service providers. This …

Malware Forensics Field Guide for Windows Systems

If you are looking for a field guide that will help you identify malware on a Windows computer system, examine it, and determine its impact, than this book might be just the …

The Death of the Internet

Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, …

Information Systems for Managers: Text & Cases, 2nd Edition

Information Systems for Managers is a text for MBA and other managerially-oriented courses on Information Systems. As with the first edition, the main focus of the book is on …

Administering Microsoft SQL Server 2012 Databases

Ace your preparation for the skills measured by Exam 70-462—and on the job—with this official Microsoft study guide. Work at your own pace through a series of lessons and …

Don't miss

Cybersecurity news