Computers / Personal Computing

Best Selling

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete Personal Computing

 

In category

Operating Systems (855)

Networking (783)

Office automation (363)

Internet (71)

 

Protection

All (2038)

DRM Free (355)

DRM (1683)

More options

Kali Linux Cookbook

by Pritchett Willie L. & Smet David De

A practical, cookbook style with numerous chapters and recipes explaining the penetration testing. The cookbook-style recipes allow you to go directly to your topic of interest if you are an expert using this...


Linux iptables Pocket Reference

by Gregor N. Purdy

Firewalls, Network Address Translation (NAT), network logging and accounting are all provided by Linux's Netfilter system, also known by the name of the command used to administer it, iptables. The iptables...


Web Security, Privacy & Commerce

by Simson Garfinkel & Gene Spafford

Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats...


IBM InfoSphere Replication Server and Data Event Publisher

by Pav Kumar Chatterjee

This is a developer's guide and is written in a style suitable to professionals. The initial chapters cover the basic theory and principles of Q replication and WebSphere MQ. As the book advances, numerous real-world...


JBoss AS 7 Configuration, Deployment and Administration

by Francesco Marchioni

You will be guided through setting up a JBoss application server in a logical order, with plenty of screenshots and practical instructions to help. Java system administrators, developers, and application testers...


Take Control of OS X Server

by Charles Edge

Learn to run your own server for file, calendar, backup, and other services!

Updated February 18, 2016

We won't beat around the bush -- running Apple's OS X Server requires a lot more knowledge and effort than...


Macs on the Go

by John Tollett & Robin Williams

Now that you have a Mac laptop, you have everything

you need to be a Road Warrior—a mobile computing

expert. Grab your Mac laptop and let John and Robin

show you how to realize the full potential of mobile...


Layer 2 VPN Architectures

by Wei Luo

A complete guide to understanding, designing, and deploying Layer 2 VPN technologies and pseudowire emulation applications

  • Evaluate market drivers for Layer 2 VPNs
  • Understand the architectural frame-work and...


Cisco Voice Gateways and Gatekeepers

by Denise Donohue, Ken Salhoff & David Mallory

Deployments of voice over IP (VoIP) networks continue at a rapid pace. Voice gateways are an essential part of VoIP networks, handling the many tasks involved in translating between transmission formats and...


iOS Development with Flash: Your visual blueprint for developing Apple apps

by Julian Dolce

Use your Flash skills to create popular apps for Apple products

The new version of Flash allows you to export your developed applications as iOS apps, which can then be uploaded to Apple?s app store. Written...


QuickBooks 2010 on Demand

by Gail, CPA Perry & Laura Madeira

QuickBooks Financial Software has become the preferred accounting software for the small business market. QuickBooks 2010 On Demand is a task-based reference book, designed to appeal to the QuickBooks user who...


PowerShell Troubleshooting Guide

by Shepard Michael

The techniques in this book apply to beginners who have just started to learn PowerShell, as well as advanced scripters who have a good grasp of the language.


Learning Concurrent Programming in Scala

by Prokopec Aleksandar

This book is a must-have tutorial for software developers aiming to write concurrent programs in Scala, or broaden their existing knowledge of concurrency. This book is intended for Scala programmers that have...


Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization

by Tyler Wrightson

Master the tactics and tools of the advanced persistent threat hacker

In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target...


Strategic Mobile Design: Creating Engaging Experiences

by Adobe Creative Team

This book gives anyone interested in mobile campaigns, both client-side and production-side, the knowledge to approach a mobile project with a cohesive strategy. The book presents a holistic view of the mobile...


Apple Training Series: Xsan 2 Administration: A Guide to Designing, Deploying, and Maintaining Xsan

by Robert Kite

Xsan is a 64-bit cluster file system specifically designed for small and large computing environments that demand the highest level of data availability. This book takes an in-depth look at Xsan 2 components,...


The Mac OS X Leopard Book

by Scott Kelby

With so many books out there on Mac OS X Leopard, what makes this one better and different is its focus. While other Leopard books can regularly be 500-plus pages, this book cuts through all the technical jargon...


Building a BeagleBone Black Super Cluster

by Reichel Andreas Josef

If you are a programmer, scientist, or someone interested in modern computer technology that goes beyond the typical PC, then this book will show you the outstanding possibilities of cluster computing with modern...


Git Best Practices Guide

by Pidoux Eric

If you are a developer and you want to completely master Git without heavy theory, this is the book for you. A reasonable knowledge level and basic understanding of Git concepts will get you started with this...


Ubuntu Unleashed 2015 Edition: Covering 14.10 and 15.04

by Matthew Helmke

Ubuntu Unleashed 2015 Edition is filled with unique and advanced information for everyone who wants to make the most of the Linux-based Ubuntu operating system. This new edition has been thoroughly revised...