Computers

Best Selling / Page 264

icon Subscribe to feed

Browse

Best Selling

New Releases

Our selection

Awards

 

Category

Delete Computers

 

In category

Programming (1890)

Personal Computing (1222)

Web (1028)

Database (654)

Graphism (651)

Enterprise software and computing (594)

System Administration (343)

Hardware and devices (332)

Audio, Vidéo (328)

Network and Telecommunications (64)

Computer Architecture (53)

Theory (2)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (8017)

French (27)

German (62)

Spanish (104)

Italian (75)

 

Protection

All (9421)

DRM Free (1404)

DRM (8017)

More options

Kismet Hacking

by Frank Thornton, Michael J. Schearer & Brad Haines

Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.

Unlike other wireless networking...


Business Modeling: A Practical Guide to Realizing Business Value

by David M. Bridgeland & Ron Zahavi

As business modeling becomes mainstream, every year more and more companies and government agencies are creating models of their businesses. But creating good business models is not a simple endeavor. Business...


Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD: The Complete Series Collector's Edition, Final Chapter, and DVD

by Johnny Long, Ryan Russell & Timothy Mullen

"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no...


The IT Regulatory and Standards Compliance Handbook:: How to Survive Information Systems Audit and Assessments

by Craig S. Wright

This book provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both...


Integrating ISA Server 2006 with Microsoft Exchange 2007

by Fergus Strachan

This book is a convenient, targeted, single-source guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike longwinded "comprehensive resources" it doesn't waste time re-hashing general information...


Up and Running with Autodesk Inventor Simulation 2010: A Step-by-Step Guide to Engineering Design Solutions

by Wasim Younis

Inventor Simulation is an essential part of the Autodesk Digital Prototyping process. It allows engineers and designers to explore and test components and products virtually, visualizing and simulating real-world...


Matlab: A Practical Introduction to Programming and Problem Solving

by Stormy Attaway

Matlab: A Practical Introduction to Programming and Problem Solving discusses the basic programming concepts and skills needed for problem solving using MATLAB software. The book differs from other texts in...


Practical DMX Queries for Microsoft SQL Server Analysis Services 2008

by Art Tennick

250+ Ready-to-Use, Powerful DMX Queries

Transform data mining model information into actionable business intelligence using the Data Mining Extensions (DMX) language. Practical DMX Queries for Microsoft SQL...


Handbook of Statistical Analysis and Data Mining Applications

by Robert Nisbet & John Elder

The Handbook of Statistical Analysis and Data Mining Applications is a comprehensive professional reference book that guides business analysts, scientists, engineers and researchers (both academic and industrial)...


Google Sketchup and Sketchup Pro 7 Bible

by Kelly L. Murdock

Google SketchUp & SketchUp Pro Bible will target design professionals who are increasingly turning to SketchUp and SketchUp Pro to easily create professional quality designs and design presentations. This book...


SQL Injection Attacks and Defense

by Justin Clarke

Winner of the Best Book Bejtlich Read in 2009 award!

"SQL injection is probably the number one problem for any server-side application, and this book is unequaled in its coverage." Richard Bejtlich, http://taosecurity.blogspot.com/...


Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity

by Jesse Varsalone & Dale Liu

Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as...


Seven Deadliest Microsoft Attacks

by Rob Kraus, Mike Borkin & Brian Barber

Seven Deadliest Microsoft Attacks explores some of the deadliest attacks made against Microsoft software and networks and how these attacks can impact the confidentiality, integrity, and availability of the...


Microsoft Windows 7 Administrator's Reference: Upgrading, Deploying, Managing, and Securing Windows 7

by Jorge Orchilles

Microsoft Windows 7 Administrators Reference covers various aspects of Windows 7 systems, including its general information as well as installation and upgrades. This reference explains how to deploy, use, and...


Seven Deadliest Web Application Attacks

by Mike Shema

Seven Deadliest Wireless Technologies Attacks draws attention to the vagaries of Web security by discussing the seven deadliest vulnerabilities exploited by attackers. Each chapter presents examples of different...


Seven Deadliest Network Attacks

by Stacy Prowell, Rob Kraus & Mike Borkin

Seven Deadliest Network Attacks identifies seven classes of network attacks and discusses how the attack works, including tools to accomplish the attack, the risks of the attack, and how to defend against the...


Seven Deadliest Wireless Technologies Attacks

by Brad Haines

Seven Deadliest Wireless Technologies Attacks provides a comprehensive view of the different attacks against popular wireless protocols and systems. Each chapter includes an example real attack scenario; an...


Controller-Based Wireless LAN Fundamentals: An end-to-end reference guide to design, deploy, manage, and secure 802.11 wireless networks, Adobe Reader

by Jeff Smith, Jake Woodhams & Robert Marg

Controller-Based Wireless LAN Fundamentals

An end-to-end reference guide to design, deploy, manage, and secure 802.11 wireless networks

 

As wired networks are increasingly replaced with 802.11n wireless connections,...


OS X Mountain Lion for Dummies

by Bob LeVitus

Tame your Mountain Lion, the "Dr. Mac" way

Author Bob "Dr. Mac" LeVitus is a Mac guru and one of the world's leading authorities on all things Apple, so when he talks OS X Mountain Lion, people listen. Now you...


Mastering Autodesk Revit Mep 2013

by Don Bokmiller, Plamen Hristov & Simon Whitbread

An outstanding tutorial and reference for Autodesk Revit MEP

This Autodesk Official Training Guide is the detailed reference and tutorial you need to master the powerful Autodesk Revit MEP 2013 building information...