Computers / Personal Computing / Networking

Best Selling

icon Subscribe to feed


New & Noteworthy

Best Selling

New Releases



English (120)

French (1)

German (15)

Spanish (2)

Italian (1)



Delete Networking



Adult (120)



All (120)

DRM Free (12)

DRM (103)

More options

The All-New Switch Book: The Complete Guide to LAN Switching Technology

by Rich Seifert & James Edwards

This much-needed update to the bestselling guide on the extensive changes to the local area networks (LAN) switching technologies explains why LAN switching technologies are critical to network design. This...

Computing Networks: From Cluster to Cloud Computing

by Pascale Vicat-Blanc, Brice Goglin, Romaric Guillier & Sebastien Soudan

?Computing Networks? explores the core of the new distributed computing infrastructures we are using today:  the networking systems of clusters, grids and clouds. It helps network designers and distributed-application...

CEH v11

by Ric Messier

Master CEH v11 and identify your weak spots 

CEH: Certified Ethical Hacker Version 11 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed...

Ransomware Protection Playbook

by Roger A. Grimes

Avoid becoming the next ransomware victim by taking practical steps today 

Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And...

Fight Fire with Fire

by Renee Tarun

Organizations around the world are in a struggle for survival, racing to transform themselves in a herculean effort to adapt to the digital age, all while protecting themselves from headline-grabbing cybersecurity...

Threat Hunting in the Cloud

by Chris Peiris, Binil Pillai & Abbas Kudrati

Implement a vendor-neutral and multi-cloud cybersecurity and risk mitigation framework with advice from seasoned threat hunting pros

In Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms...

Security and its Challenges in the 21st Century

by Claudine Guerrier

By the year 2000, a balance was sought between security requirements and a respect for privacy, as well as for individual and collective freedoms. As we progress further into the 21st century, however, security...

Dynamically Enabled Cyber Defense

by Lin Yang & Quan Yu

The book puts forward dynamically enabled cyber defense technology as a solution to the system homogenization problem. Based on the hierarchy of the protected information system entity, the book elaborates on...

The Official (ISC)2 CISSP CBK Reference

by Arthur J. Deane & Aaron Kraus

The only official, comprehensive reference guide to the CISSP

Thoroughly updated for 2021 and beyond, this is the authoritative common body of knowledge (CBK) from (ISC)2 for information security professionals...

CASP+ CompTIA Advanced Security Practitioner Practice Tests

by Nadean H. Tanner

Prepare for success on the challenging CASP+ CAS-004 exam 

In the newly updated Second Edition of CASP+ CompTIA Advanced Security Practitioner Practice Tests Exam CAS-004, accomplished cybersecurity expert Nadean...

Cloud Native Security

by Chris Binnie & Rory McCune

Explore the latest and most comprehensive guide to securing your Cloud Native technology stack 

Cloud Native Security delivers a detailed study into minimizing the attack surfaces found on today’s Cloud...

(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests

by Mike Chapple & David Seidl

Full-length practice tests covering all CISSP domains for the ultimate exam prep

The (ISC)2 CISSP Official Practice Tests is a major resource for (ISC)2 Certified Information Systems Security Professional (CISSP)...

(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide

by Mike Chapple, James Michael Stewart & Darril Gibson

CISSP Study Guide -  fully updated for the 2021 CISSP Body of Knowledge 

(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based...

The Official (ISC)2 CCSP CBK Reference

by Leslie Fife, Aaron Kraus & Bryan Lewis

The only official body of knowledge for CCSP—the most popular cloud security credential—fully revised and updated.

Certified Cloud Security Professional (CCSP) certification validates the advanced technical...

Do No Harm

by Matthew Webster

Discover the security risks that accompany the widespread adoption of new medical devices and how to mitigate them  

In Do No Harm: Protecting Connected Medical Devices, Healthcare, and Data from Hackers...


by Sebastian Ace

How to Get a Job Using LinkedIn: The Most Effective Way to Get the Job of Your Dreams 

You’re about to discover how to create, connect and build your social presence starting with your LinkedIn Profile and...

Service Level Management in Emerging Environments

by Nader Mbarek

Networks are now embedded in daily life thanks to smaller, faster, inexpensive components that are more powerful and increasingly connected. Parallel to this quantitative explosion of communication networks,...

Intelligent Network Management and Control

by Badr Benmammar

The management and control of networks can no longer be envisaged without the introduction of artificial intelligence at all stages.

Intelligent Network Management and Control deals with topical issues related...

Chance, Calculation and Life

by Thierry Gaudin, Marie-Christine Maurel & Jean-Charles Pomerol

Chance, Calculation and Life brings together 16 original papers from the colloquium of the same name, organized by the International Cultural Center of Cerisy in 2019.

From mathematics to the humanities and...

Using Science in Cybersecurity

by Leigh Metcalf & Jonathan Spring

Deploying the scientific method in cybersecurity today is a common-sense approach that is a tough topic in the field of cybersecurity. While most publications in the field emphasize that scientific principles...