Free Delivery Over $100
10346 books were found.
Read More >>
Written in an easy-to-follow approach using hands-on examples, this book helps you create virtual environments for... Read More >>
Whether attending conferences, visiting clients, or going to sales meetings, travel is an unavoidable necessity... Read More >>
Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small,... Read More >>
If you are a developer with some Android knowledge, but you do not know how to test your applications using Android... Read More >>
Information Governance and Security shows managers in any size organization how to create and implement the policies,... Read More >>
If you have some understanding of IT infrastructure principles and are ready to find out what Chef is all about,... Read More >>
Are you in danger of being cyberstalked? Have you been cyberbullied? Outwit your cyberattacker with these clever... Read More >>
Children and teens with autism can be particularly vulnerable to online dangers and this practical handbook explains... Read More >>
Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact?... Read More >>
If you are an expert Perl programmer interested in penetration testing or information security, this guide is designed... Read More >>
At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments,... Read More >>
The greatest threat to privacy today is not the NSA, but good-old American companies. Internet giants, leading retailers,... Read More >>
Whether you are an IT manager, an administrator, or security professional who wants to learn how Microsoft Security... Read More >>
If you are a security engineer or a system administrator and want to secure your server infrastructure with the... Read More >>
This book is aimed at IT professionals who want to develop or enhance their packet analysis skills. Basic familiarity... Read More >>
If you want to learn how to use Ansible to automate an infrastructure, either from scratch or to augment your current... Read More >>
This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on Trusted... Read More >>
This brief provides readers a complete and self-contained resource for information about DDoS attacks and how to... Read More >>