Computers / Personal Computing / Networking

Best Selling

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete Networking

 

Language

English (766)

French (6)

German (33)

Spanish (2)

Italian (0)

 

Protection

All (766)

DRM Free (69)

DRM (697)

More options

Kali Linux Cookbook

by Pritchett Willie L. & Smet David De

A practical, cookbook style with numerous chapters and recipes explaining the penetration testing. The cookbook-style recipes allow you to go directly to your topic of interest if you are an expert using this...


Web Security, Privacy & Commerce

by Simson Garfinkel & Gene Spafford

Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats...


JBoss AS 7 Configuration, Deployment and Administration

by Francesco Marchioni

You will be guided through setting up a JBoss application server in a logical order, with plenty of screenshots and practical instructions to help. Java system administrators, developers, and application testers...


Layer 2 VPN Architectures (paperback)

by Wei Luo

A complete guide to understanding, designing, and deploying Layer 2 VPN technologies and pseudowire emulation applications

  • Evaluate market drivers for Layer 2 VPNs
  • Understand the architectural frame-work and...


Cisco Voice Gateways and Gatekeepers (paperback)

by Denise Donohue, Ken Salhoff & David Mallory

Deployments of voice over IP (VoIP) networks continue at a rapid pace. Voice gateways are an essential part of VoIP networks, handling the many tasks involved in translating between transmission formats and...


PowerShell Troubleshooting Guide

by Shepard Michael

The techniques in this book apply to beginners who have just started to learn PowerShell, as well as advanced scripters who have a good grasp of the language.


Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization

by Tyler Wrightson

Master the tactics and tools of the advanced persistent threat hacker

In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target...


Strategic Mobile Design: Creating Engaging Experiences

by Adobe Creative Team

This book gives anyone interested in mobile campaigns, both client-side and production-side, the knowledge to approach a mobile project with a cohesive strategy. The book presents a holistic view of the mobile...


CCNA Data Center DCICN 640-911 Official Cert Guide

by Wendell Odom & Chad Hintz

Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. This series is built with the objective of providing assessment, review, and practice...


The iPad 2 Project Book

by Michael E. Cohen, Dennis R. Cohen & Lisa L. Spangenberg

Using your iPad is not a passive activity. With its stunning touchscreen, front and back cameras, and sweeping collection of apps, the iPad 2 is perfect for doing stuff--for building, creating, and organizing....


Microsoft IIS 6 Delta Guide

by Don Jones & Martin C. Brown

Microsoft¿s Internet Information Server 6 is an Internet server program that works with the Windows Server 2003 operating system. IIS is Microsoft¿s answer in the Internet server market to Apache, the open...


ASP.NET 3.5 AJAX Unleashed

by Robert Foster

As the Internet user experience (UX) progresses, more users are demanding and expecting their custom-built business applications to provide the same UX that they see on the Internet every day. ASP.NET 3.5 AJAX...


Cisco Unity Fundamentals

by Brian Morgan & Moises Gonzalez

A comprehensive introduction to deploying, configuring, and maintaining Cisco Unity

  • Discover the various Cisco Unity integration and deployment solutions, as well as the environmental differences between PBX...


The Droid Pocket Guide

by Jason D. O'Grady

In this handy new Pocket Guide, mobile device expert Jason O'Grady reveals the secrets to using the DROID. He covers everything from how to make phone calls, send text messages and email to synching  data with...


Sams Teach Yourself SharePoint 2007 in 24 Hours: Using Windows SharePoint Services 3.0

by Mike Walsh

In just 24 sessions of one hour or less, you will be up and running with Windows SharePoint Services 3.0. Using a straightforward, step-by-step approach, each lesson builds upon a real-world foundation forged...


Microsoft System Center 2012 R2 Compliance Management Cookbook

by Baumgarten Andreas & Isherwood Ronnie

Whether you are an IT manager, an administrator, or security professional who wants to learn how Microsoft Security Compliance Manager and Microsoft System Center can help fulfil compliance and security requirements,...


Proxmox High Availability

by Cheng Simon M.C.

If you want to know the secrets of virtualization and how to implement high availability on your services, this is the book for you. For those of you who are already using Proxmox, this book offers you the chance...


Optimized Cloud Resource Management and Scheduling: Theories and Practices

by Wenhong Dr. Tian & Yong Dr. Zhao

Optimized Cloud Resource Management and Scheduling identifies research directions and technologies that will facilitate efficient management and scheduling of computing resources in cloud data centers supporting...


Citrix XenApp® 7.5 Desktop Virtualization Solutions

by Paul Andy

If you are a Citrix® engineer, a virtualization consultant, or an IT project manager with prior experience of using Citrix XenApp® and related technologies for desktop virtualization and want to further explore...


.NET and COM: The Complete Interoperability Guide

by Adam Nathan

This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version.

The focus of the book is on COM Interoperability (since it's a much...