Best Selling / Page 344

icon Subscribe to feed


Best Selling

New Releases




Delete Computers


In category

Programming (2941)

Personal Computing (1941)

Web (1637)

Database (984)

Graphism (830)

Enterprise software and computing (682)

Hardware and devices (509)

Audio, Vidéo (506)

System Administration (497)

Network and Telecommunications (122)

Computer Architecture (80)

Theory (2)





Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :



English (11203)

French (470)

German (772)

Spanish (123)

Italian (569)



All (11203)

DRM Free (1468)

DRM (9735)

More options

Pages for iPad: Visual QuickStart Guide

by Nolan Hester

Visual QuickStart Guides, designed in an attractive tutorial and reference format, are the quickest, easiest, and most thorough way to learn applications, tasks, and technologies. The Visual QuickStart Guides...

SmartDraw For Dummies

by Daniel G. Hoffmann & Doug Lowe

Diagrams, organizational charts, flowcharts, even floor plans - they're all types of business graphics. Only one tool does 'em all: SmartDraw. SmartDraw For Dummies shows you how this business graphics software...

Kismet Hacking

by Frank Thornton, Michael J. Schearer & Brad Haines

Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.

Unlike other wireless networking...

Business Modeling: A Practical Guide to Realizing Business Value

by David M. Bridgeland & Ron Zahavi

As business modeling becomes mainstream, every year more and more companies and government agencies are creating models of their businesses. But creating good business models is not a simple endeavor. Business...

Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD

by Johnny Long, Ryan Russell & Timothy Mullen

"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no...

The IT Regulatory and Standards Compliance Handbook:: How to Survive Information Systems Audit and Assessments

by Craig S. Wright

This book provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both...

Integrating ISA Server 2006 with Microsoft Exchange 2007

by Fergus Strachan

This book is a convenient, targeted, single-source guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike longwinded "comprehensive resources" it doesn't waste time re-hashing general information...

Up and Running with Autodesk Inventor Simulation 2010: A Step-by-Step Guide to Engineering Design Solutions

by Wasim Younis

Inventor Simulation is an essential part of the Autodesk Digital Prototyping process. It allows engineers and designers to explore and test components and products virtually, visualizing and simulating real-world...

Matlab: A Practical Introduction to Programming and Problem Solving

by Stormy Attaway

Matlab: A Practical Introduction to Programming and Problem Solving discusses the basic programming concepts and skills needed for problem solving using MATLAB software. The book differs from other texts in...

Practical DMX Queries for Microsoft SQL Server Analysis Services 2008

by Art Tennick

250+ Ready-to-Use, Powerful DMX Queries

Transform data mining model information into actionable business intelligence using the Data Mining Extensions (DMX) language. Practical DMX Queries for Microsoft SQL...

Handbook of Statistical Analysis and Data Mining Applications

by Robert Nisbet & John Elder

The Handbook of Statistical Analysis and Data Mining Applications is a comprehensive professional reference book that guides business analysts, scientists, engineers and researchers (both academic and industrial)...

Google<sup>®</sup> SketchUp and SketchUp Pro 7 Bible

by Kelly L. Murdock

Google SketchUp & SketchUp Pro Bible will target design professionals who are increasingly turning to SketchUp and SketchUp Pro to easily create professional quality designs and design presentations. This book...

SQL Injection Attacks and Defense

by Justin Clarke

Winner of the Best Book Bejtlich Read in 2009 award!

"SQL injection is probably the number one problem for any server-side application, and this book is unequaled in its coverage." Richard Bejtlich,

Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity

by Jesse Varsalone & Dale Liu

Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as...

Seven Deadliest Microsoft Attacks

by Rob Kraus, Mike Borkin & Brian Barber

Seven Deadliest Microsoft Attacks explores some of the deadliest attacks made against Microsoft software and networks and how these attacks can impact the confidentiality, integrity, and availability of the...

Microsoft Windows 7 Administrator's Reference: Upgrading, Deploying, Managing, and Securing Windows 7

by Jorge Orchilles

Microsoft Windows 7 Administrators Reference covers various aspects of Windows 7 systems, including its general information as well as installation and upgrades. This reference explains how to deploy, use, and...

Seven Deadliest Web Application Attacks

by Mike Shema

Seven Deadliest Wireless Technologies Attacks draws attention to the vagaries of Web security by discussing the seven deadliest vulnerabilities exploited by attackers. Each chapter presents examples of different...

Seven Deadliest Network Attacks

by Stacy Prowell, Rob Kraus & Mike Borkin

Seven Deadliest Network Attacks identifies seven classes of network attacks and discusses how the attack works, including tools to accomplish the attack, the risks of the attack, and how to defend against the...

Seven Deadliest Wireless Technologies Attacks

by Brad Haines

Seven Deadliest Wireless Technologies Attacks provides a comprehensive view of the different attacks against popular wireless protocols and systems. Each chapter includes an example real attack scenario; an...

Controller-Based Wireless LAN Fundamentals: An end-to-end reference guide to design, deploy, manage, and secure 802.11 wireless networks

by Jeff Smith, Jake Woodhams & Robert Marg

Controller-Based Wireless LAN Fundamentals

An end-to-end reference guide to design, deploy, manage, and secure 802.11 wireless networks


As wired networks are increasingly replaced with 802.11n wireless connections,...