If your household harbors more than one computer, you’ve probably wondered about home networking. Maybe you’ve gone so far as …
The ultimate reference guide for network administratorsNetwork administrators now have a single, convenient place to turn for all the information …
10 books in 1 - your key to networking success! Your one-stop guide to the latest updates on networking Packed …
Are you ready to build a network, but aren't sure where to start? Networking All-In-One For Dummies, 6th Edition walks …
More than half a century after the advent of the nuclear age, is the world approaching a tipping point that …
Britain is facing big security challenges in the 2020s. The decade to come will not be as favourable as the …
Master the skills and techniques that are required to design, deploy, and administer real Linux-based networksAbout This BookMaster the art …
The Laboratory Manual is a valuable tool designed to enhance your lab experience. Lab activities, objectives, materials lists, step-by-step procedures, …
This best-selling guide provides a complete, practical, up-to-date introduction to network and computer security. SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, …
An up-to-date CompTIA Security+ exam guide from training and exam preparation guru Mike Meyers In Mike Meyers’ CompTIA Security+™ Certification …
The best guide to the Metasploit Framework. —HD Moore, Founder of the Metasploit ProjectThe Metasploit Framework makes discovering, exploiting, and …
It’s easy to capture packets with Wireshark, the world’s most popular network sniffer, whether off the wire or from the …
Knowing how to install, configure, and troubleshoot a computer network is a highly marketable and exciting skill. This book first …
An authoritative guide to investigating high-technology crimesInternet crime is seemingly ever on the rise, making the need for a comprehensive …
An informative guide to implementing and using AWS security services effectively About This Book • Learn to secure your network, …
The book is a great introduction to system design issues that are only taught at few courses in few universities. …
It's easy to capture packets with Wireshark, the world's most popular network sniffer, whether off the wire or from the …
A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities …
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android …
"I honestly didn't believe I'd learn much from the book because I've been working on Android security for many years. …
The first comprehensive guide to discovering and preventing attacks on the Android OSAs the Android operating system continues to increase …
Mobile Phone Security and Forensics provides both theoretical and practical background of security and forensics for mobile phones. The author …
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other …
India-Pakistan rivalry remains one of the most enduring and unresolved conflicts of our times. It began with the birth of …
We can all be Linux experts, provided we invest the time in learning the craft of Linux administration. Pro Linux …
In the past quarter century, the importance of Asia in international relations has grown exponentially. This Handbook gathers the most …
This handbook examines the theory and practice of international relations in Asia. Building on an investigation of how various theoretical …
"A superb book.…Mearsheimer has made a significant contribution to our understanding of the behavior of great powers."―Barry R. Posen, The …
Geared to intermediate- to advanced-level DBAs and IT professionals looking to enhance their MySQL skills, this guide provides a comprehensive …
In today's cloud native world, where we automate as much as possible, everything is code. With this practical guide, you'll …
You are under surveillance right now.Your cell phone provider tracks your location and knows who’s with you. Your online and …
The Most Progressive and Complete Guide to DDO-Based Ciphers Developers have long recognized that ciphers based on Permutation Networks (PNs) …
For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. …